<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="154" disabled="39" errors="0" failures="6" time="5142.377093002">
      <testsuite name="Build Service E2E" package="/workspace/source/test/e2e" tests="154" disabled="7" skipped="32" errors="0" failures="6" time="5142.377093002" timestamp="2026-04-29T11:01:33">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value="Suite Timeout Elapsed"></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1777460234"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value="build-service"></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="true"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="10"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="24.745954162">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /workspace/source/test/e2e/secret_lookup.go:32 @ 04/29/26 11:01:33.473&#xA;&lt; Exit [BeforeAll] test build secret lookup - /workspace/source/test/e2e/secret_lookup.go:32 @ 04/29/26 11:01:37.948 (4.475s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /workspace/source/test/e2e/secret_lookup.go:100 @ 04/29/26 11:01:37.949&#xA;&lt; Exit [BeforeAll] when two secrets are created - /workspace/source/test/e2e/secret_lookup.go:100 @ 04/29/26 11:01:38.087 (138ms)&#xA;&gt; Enter [It] creates first component - /workspace/source/test/e2e/secret_lookup.go:123 @ 04/29/26 11:01:38.087&#xA;Image repository for component component-one-harx in namespace build-e2e-bful do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-one-harx in namespace build-e2e-bful do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates first component - /workspace/source/test/e2e/secret_lookup.go:123 @ 04/29/26 11:01:58.219 (20.132s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:01:58.219&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:01:58.219 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="30.127453266">
              <system-err>&gt; Enter [It] creates second component - /workspace/source/test/e2e/secret_lookup.go:140 @ 04/29/26 11:01:58.22&#xA;Image repository for component component-two-xacm in namespace build-e2e-bful do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-xacm in namespace build-e2e-bful do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-xacm in namespace build-e2e-bful do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates second component - /workspace/source/test/e2e/secret_lookup.go:140 @ 04/29/26 11:02:28.347 (30.127s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:02:28.347&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:02:28.347 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="0.061569844">
              <system-err>&gt; Enter [It] check first component annotation has errors - /workspace/source/test/e2e/secret_lookup.go:158 @ 04/29/26 11:02:28.348&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /workspace/source/test/e2e/secret_lookup.go:158 @ 04/29/26 11:02:28.409 (61ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:02:28.409&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:02:28.409 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="81.230392507">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /workspace/source/test/e2e/secret_lookup.go:178 @ 04/29/26 11:02:28.41&#xA;PipelineRun has not been created yet for the component build-e2e-bful/component-two-xacm&#xA;PipelineRun has not been created yet for the component build-e2e-bful/component-two-xacm&#xA;PipelineRun has not been created yet for the component build-e2e-bful/component-two-xacm&#xA;PipelineRun has not been created yet for the component build-e2e-bful/component-two-xacm&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /workspace/source/test/e2e/secret_lookup.go:178 @ 04/29/26 11:03:49.64 (1m21.23s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:03:49.64&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:03:49.64 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="129.745662342">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /workspace/source/test/e2e/secret_lookup.go:193 @ 04/29/26 11:03:49.641&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /workspace/source/test/e2e/secret_lookup.go:193 @ 04/29/26 11:05:49.641 (2m0s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /workspace/source/test/e2e/secret_lookup.go:61 @ 04/29/26 11:05:49.642&#xA;&lt; Exit [AfterAll] test build secret lookup - /workspace/source/test/e2e/secret_lookup.go:61 @ 04/29/26 11:05:59.386 (9.744s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:05:59.386&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/secret_lookup.go:25 @ 04/29/26 11:05:59.387 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Build Service E2E" status="passed" time="74.58428326">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /workspace/source/test/e2e/annotations.go:35 @ 04/29/26 11:01:33.473&#xA;&lt; Exit [BeforeAll] test build annotations - /workspace/source/test/e2e/annotations.go:35 @ 04/29/26 11:01:36.474 (3s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /workspace/source/test/e2e/annotations.go:69 @ 04/29/26 11:01:36.474&#xA;Image repository for component test-annotations-nbhbis in namespace build-e2e-ucrr do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /workspace/source/test/e2e/annotations.go:69 @ 04/29/26 11:01:46.607 (10.134s)&#xA;&gt; Enter [It] handles invalid request annotation - /workspace/source/test/e2e/annotations.go:89 @ 04/29/26 11:01:46.607&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /workspace/source/test/e2e/annotations.go:89 @ 04/29/26 11:02:46.674 (1m0.066s)&#xA;&gt; Enter [AfterAll] test build annotations - /workspace/source/test/e2e/annotations.go:51 @ 04/29/26 11:02:46.674&#xA;&lt; Exit [AfterAll] test build annotations - /workspace/source/test/e2e/annotations.go:51 @ 04/29/26 11:02:48.057 (1.383s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/annotations.go:24 @ 04/29/26 11:02:48.057&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/annotations.go:24 @ 04/29/26 11:02:48.057 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="92.994777869">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:33.569&#xA;&lt; Exit [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:50.16 (16.591s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:01:50.16&#xA;Image repository for component gl-test-custom-default-bulwbv in namespace build-e2e-fcrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-bulwbv in namespace build-e2e-fcrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-bulwbv in namespace build-e2e-fcrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:02:20.301 (30.141s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:02:20.302&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:03:06.563 (46.261s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:06.563&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:06.563 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.13311617">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:03:06.564&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:03:06.697 (132ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:06.697&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:06.697 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="21.386167361">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:03:06.698&#xA;PipelineRun has not been created yet for the component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:03:28.083 (21.385s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.084&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.084 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.000315468">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:03:28.085&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:03:28.085 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.085&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.085 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.323212068">
              <system-err>&gt; Enter [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:03:28.085&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://gitlab.com/konflux-qe/devfile-sample-hello-world-wwnhtv/-/merge_requests/1&#34;,&#34;configuration-time&#34;:&#34;Wed, 29 Apr 2026 11:03:04 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://gitlab.com/konflux-qe/devfile-sample-hello-world-wwnhtv/-/merge_requests/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 29 Apr 2026 11:03:04 UTC&#xA;&lt; Exit [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:03:28.408 (323ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.408&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:28.408 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.548964577">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:03:28.409&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:03:29.958 (1.548s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:29.958&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:29.958 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.31225771">
              <system-err>&gt; Enter [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:03:29.959&#xA;&lt; Exit [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:03:30.271 (312ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:30.271&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:30.271 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="111.13380833">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:03:30.272&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:05:21.405 (1m51.133s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:21.406&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:21.406 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.171118906">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:05:21.406&#xA;&lt; Exit [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:05:21.577 (171ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:21.577&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:21.577 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.906910129">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:05:21.578&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:05:22.484 (907ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:22.484&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:22.485 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="33.411604677">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:05:22.485&#xA;Image repository for component gl-test-custom-branch-tpwyhi in namespace build-e2e-fcrk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:05:33.102 (10.617s)&#xA;&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:05:33.102&#xA;PipelineRun has not been created yet for the component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:05:55.896 (22.794s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:55.897&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:55.897 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.260751725">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:05:55.897&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:05:56.157 (260ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:56.158&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:56.158 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="440.217409539">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:05:56.159&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz found for Component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:13:16.376 (7m20.217s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:16.376&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:16.376 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="2.028141905">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:13:16.377&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:13:18.404 (2.028s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:18.405&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:18.405 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.287779877">
              <system-err>&gt; Enter [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:13:18.405&#xA;&lt; Exit [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:13:18.693 (287ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:18.693&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:18.693 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.851171554">
              <system-err>&gt; Enter [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:13:18.694&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-fcrk/gl-test-custom-branch-tpwyhi:on-pr-f3ae9231fbce2313cc4abec4b92207f34e130cb5 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:13:19.545 (851ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:19.545&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:19.545 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.72308299">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:13:19.545&#xA;&lt; Exit [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:13:20.268 (723ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:20.268&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:20.268 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.397127356">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:13:20.269&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:13:20.553 (284ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:13:20.553&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:13:20.666 (113ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:20.666&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:13:20.666 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="46.855572608">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:13:20.667&#xA;created file sha: fa200585069ac45ddd8086958403baff0a86a0ca&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:13:21.79 (1.123s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:13:21.79&#xA;PipelineRun has not been created yet for the component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:14:07.522 (45.732s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:07.522&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:07.522 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.187328057">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:14:07.523&#xA;&lt; Exit [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:14:07.71 (187ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:07.71&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:07.71 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="failed" time="1363.279206863">
              <failure message="Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001566890&gt;: &#xA;    failed to delete PipelineRun &#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq&#34; from &#34;build-e2e-fcrk&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#xA;    {&#xA;        s: &#34;failed to delete PipelineRun \&#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq\&#34; from \&#34;build-e2e-fcrk\&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#34;,&#xA;    }" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001566890&gt;: &#xA;    failed to delete PipelineRun &#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq&#34; from &#34;build-e2e-fcrk&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#xA;    {&#xA;        s: &#34;failed to delete PipelineRun \&#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq\&#34; from \&#34;build-e2e-fcrk\&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#34;,&#xA;    }&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:494 @ 04/29/26 11:35:32.308&#xA;</failure>
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 11:14:07.711&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq found for Component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun has not been created yet for the Component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-fcrk/gl-test-custom-branch-tpwyhi&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Running&#xA;PipelineRun gl-test-custom-branch-tpwyhi-on-pull-request-mcblq reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq&#34; failed: &#xA; pod: gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz-init-pod | init container: prepare&#xA;2026/04/29 11:07:20 Entrypoint initialization&#xA;&#xA;pod: gl-test-custom-branch-tpwyhi-on-pull-request-lxjhz-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:07:26Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gl-test-custom-branch-tpwyhi-on-pull-request-mcblq-init-pod | init container: prepare&#xA;2026/04/29 11:23:28 Entrypoint initialization&#xA;&#xA;pod: gl-test-custom-branch-tpwyhi-on-pull-request-mcblq-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:26:54Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001566890&gt;: &#xA;    failed to delete PipelineRun &#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq&#34; from &#34;build-e2e-fcrk&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#xA;    {&#xA;        s: &#34;failed to delete PipelineRun \&#34;gl-test-custom-branch-tpwyhi-on-pull-request-mcblq\&#34; from \&#34;build-e2e-fcrk\&#34; namespace with error: Timeout: request did not complete within requested timeout - context deadline exceeded&#34;,&#xA;    }&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:494 @ 04/29/26 11:35:32.308&#xA;&lt; Exit [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 11:35:32.308 (21m24.597s)&#xA;&gt; Enter [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 11:35:32.308&#xA;&lt; Exit [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 11:35:32.308 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:35:32.308&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:36:50.99 (1m18.681s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:497 @ 04/29/26 11:36:50.991&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:523 @ 04/29/26 11:36:50.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:539 @ 04/29/26 11:36:50.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:545 @ 04/29/26 11:36:50.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:560 @ 04/29/26 11:36:50.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:590 @ 04/29/26 11:36:50.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:701 @ 04/29/26 11:36:50.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="68.238743276">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:01:33.57&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;fj-multi-component-parent-vojk&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:01:51.536 (17.966s)&#xA;&gt; Enter [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:01:51.536&#xA;Image repository for component fj-multi-component-child-vojk in namespace build-e2e-ducy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-child-vojk in namespace build-e2e-ducy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-child-vojk in namespace build-e2e-ducy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-parent-vojk in namespace build-e2e-ducy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-parent-vojk in namespace build-e2e-ducy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:02:41.808 (50.271s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:41.808&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:41.808 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="143.930058211">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:02:41.809&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:05:05.739 (2m23.93s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:05:05.739&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:05:05.739 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="380.197746708">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:05:05.74&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk found for Component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-pull-request-rphrk reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:11:25.937 (6m20.197s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:25.937&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:25.937 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="0.068537393">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:11:25.938&#xA;PipelineRun fj-multi-component-child-vojk-on-pull-request-gnlw8 found for Component build-e2e-ducy/fj-multi-component-child-vojk&#xA;PipelineRun fj-multi-component-child-vojk-on-pull-request-gnlw8 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:11:26.006 (68ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:26.006&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:26.006 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="0.454067428">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:11:26.007&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:11:26.46 (454ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:26.461&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:26.461 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="1.9471938899999999">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:11:26.461&#xA;merged result sha: f79715eee302c7ff7d4139d3612f424b031d2f60 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:11:28.408 (1.947s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:28.408&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:28.408 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="9.617948711">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:11:28.409&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:11:38.027 (9.617s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:38.027&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:38.027 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="0.311035509">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:11:38.028&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:11:38.338 (311ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:38.338&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:38.338 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="2.3116509179999998">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:11:38.339&#xA;merged result sha: c97123680b44e5468baf3bcfbd1edbe22a68b741 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:11:40.651 (2.311s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:40.651&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:40.651 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="20.199203192">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:11:40.651&#xA;Push PipelineRun has not been created yet for the component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:12:00.85 (20.199s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:12:00.85&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:12:00.851 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="1242.351391337">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 11:12:00.851&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 found for Component build-e2e-ducy/fj-multi-component-parent-vojk&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Running&#xA;PipelineRun fj-multi-component-parent-vojk-on-push-nsgr7 reason: Completed&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 11:32:43.202 (20m42.351s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:32:43.202&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:32:43.203 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="365.851578543">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /workspace/source/test/e2e/renovate.go:412 @ 04/29/26 11:32:43.203&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /workspace/source/test/e2e/renovate.go:412 @ 04/29/26 11:38:49.054 (6m5.851s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:38:49.055&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:38:49.055 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="1.988460043">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:429 @ 04/29/26 11:38:49.055&#xA;merged result sha: 8d51f27d0c8d146408cb40df03c97b5bceb98ab2 for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:429 @ 04/29/26 11:38:51.043 (1.988s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:38:51.043&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:38:51.043 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="passed" time="46.004921506">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /workspace/source/test/e2e/renovate.go:440 @ 04/29/26 11:38:51.044&#xA;Verifying Dockerfile.tmp updated to sha sha256:1bf88be86a621b59bcdea7adfb8dc4d21faa261eafb5bee2ae9059f4048f325acontent: FROM quay.io/redhat-appstudio-qe/build-e2e-ducy/fj-multi-component-parent-vojk@sha256:1bf88be86a621b59bcdea7adfb8dc4d21faa261eafb5bee2ae9059f4048f325a&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /workspace/source/test/e2e/renovate.go:440 @ 04/29/26 11:38:51.368 (324ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 11:38:51.368&#xA;&lt; Exit [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 11:39:37.049 (45.681s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:39:37.049&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:39:37.049 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="57.800529318">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:01:33.572&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-qdry&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:01:41.047 (7.476s)&#xA;&gt; Enter [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:01:41.047&#xA;Image repository for component gh-multi-component-child-qdry in namespace build-e2e-sctz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-child-qdry in namespace build-e2e-sctz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-child-qdry in namespace build-e2e-sctz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-qdry in namespace build-e2e-sctz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-qdry in namespace build-e2e-sctz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:02:31.372 (50.324s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:31.372&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:31.372 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="153.714528955">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:02:31.373&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:05:05.087 (2m33.714s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:05:05.087&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:05:05.087 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="400.212540158">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:05:05.088&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz found for Component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-pull-request-5cvdz reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:11:45.3 (6m40.212s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.3&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.3 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.073651021">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:11:45.301&#xA;PipelineRun gh-multi-component-child-qdry-on-pull-request-hpc95 found for Component build-e2e-sctz/gh-multi-component-child-qdry&#xA;PipelineRun gh-multi-component-child-qdry-on-pull-request-hpc95 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:11:45.375 (73ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.375&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.375 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.210760319">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:11:45.375&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:11:45.586 (210ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.586&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:45.586 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="1.942308183">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:11:45.587&#xA;merged result sha: 0f5dba7d7f9622e2ee4a8a5efa584071d4f8d1db for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:11:47.528 (1.942s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:47.529&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:47.529 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="5.760798213">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:11:47.53&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:11:53.29 (5.76s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:53.29&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:53.29 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.189440529">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:11:53.291&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:11:53.48 (189ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:53.48&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:53.48 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="1.957061123">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:11:53.481&#xA;merged result sha: 6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:11:55.437 (1.957s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:55.438&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:11:55.438 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="20.213712473">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:11:55.439&#xA;Push PipelineRun has not been created yet for the component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:12:15.652 (20.213s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:12:15.652&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:12:15.652 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="failed" time="2079.693271069">
              <failure message="Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000986ce0&gt;: &#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare&#xA;    2026/04/29 11:06:16 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare&#xA;    2026/04/29 11:33:39 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-04-29T11:34:22Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare&#xA;    2026/04/29 11:32:59 Entrypoint initialization&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts&#xA;    2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: &#xA;    Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: &#xA;    Running clair-action on amd64 image manifest...&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;}]&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mCheckManifest&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexManifest&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    {&#xA;      &#34;manifest_hash&#34;: &#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;,&#xA;      &#34;packages&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;          &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;          &#34;name&#34;: &#34;libidn2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libidn2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: {&#xA;          &#34;id&#34;: &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;,&#xA;          &#34;name&#34;: &#34;libtool-ltdl&#34;,&#xA;          &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtool&#34;,&#xA;            &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: {&#xA;          &#34;id&#34;: &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;,&#xA;          &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;          &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;          &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;          &#34;name&#34;: &#34;xz-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: {&#xA;          &#34;id&#34;: &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;,&#xA;          &#34;name&#34;: &#34;libselinux&#34;,&#xA;          &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libselinux&#34;,&#xA;            &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: {&#xA;          &#34;id&#34;: &#34;/h/TBQhfoSMCmey5oN87jA==&#34;,&#xA;          &#34;name&#34;: &#34;libsolv&#34;,&#xA;          &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsolv&#34;,&#xA;            &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: {&#xA;          &#34;id&#34;: &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;,&#xA;          &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: {&#xA;          &#34;id&#34;: &#34;0T19Aon0dgLleTpQjLWzKw==&#34;,&#xA;          &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;          &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;            &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: {&#xA;          &#34;id&#34;: &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;,&#xA;          &#34;name&#34;: &#34;file-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;file&#34;,&#xA;            &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: {&#xA;          &#34;id&#34;: &#34;2gCbp4kt+cF44NF/LqukDg==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: {&#xA;          &#34;id&#34;: &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: {&#xA;          &#34;id&#34;: &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;,&#xA;          &#34;name&#34;: &#34;audit-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;audit&#34;,&#xA;            &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: {&#xA;          &#34;id&#34;: &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: {&#xA;          &#34;id&#34;: &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;,&#xA;          &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:1.23-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gdbm&#34;,&#xA;            &#34;version&#34;: &#34;1.23-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: {&#xA;          &#34;id&#34;: &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;,&#xA;          &#34;name&#34;: &#34;zlib&#34;,&#xA;          &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: {&#xA;          &#34;id&#34;: &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;,&#xA;          &#34;name&#34;: &#34;libmount&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: {&#xA;          &#34;id&#34;: &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;,&#xA;          &#34;name&#34;: &#34;libpeas&#34;,&#xA;          &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libpeas&#34;,&#xA;            &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: {&#xA;          &#34;id&#34;: &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9olIUlLHZMdoUMju+8diyQ==&#34;,&#xA;          &#34;name&#34;: &#34;filesystem&#34;,&#xA;          &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;filesystem&#34;,&#xA;            &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;          &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;          &#34;name&#34;: &#34;libassuan&#34;,&#xA;          &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libassuan&#34;,&#xA;            &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: {&#xA;          &#34;id&#34;: &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;,&#xA;          &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;          &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;            &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: {&#xA;          &#34;id&#34;: &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;,&#xA;          &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;          &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;          &#34;name&#34;: &#34;libverto&#34;,&#xA;          &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libverto&#34;,&#xA;            &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: {&#xA;          &#34;id&#34;: &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: {&#xA;          &#34;id&#34;: &#34;FrUQI+koTfbikRk1jsFd0w==&#34;,&#xA;          &#34;name&#34;: &#34;libstdc++&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;          &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;          &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;          &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;            &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;,&#xA;          &#34;name&#34;: &#34;pcre&#34;,&#xA;          &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre&#34;,&#xA;            &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;          &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;          &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libreport&#34;,&#xA;            &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: {&#xA;          &#34;id&#34;: &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;,&#xA;          &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;          &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nghttp2&#34;,&#xA;            &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;          &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;          &#34;name&#34;: &#34;json-glib&#34;,&#xA;          &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-glib&#34;,&#xA;            &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: {&#xA;          &#34;id&#34;: &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;,&#xA;          &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;          &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;          &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;          &#34;name&#34;: &#34;popt&#34;,&#xA;          &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;popt&#34;,&#xA;            &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: {&#xA;          &#34;id&#34;: &#34;M9YTWinowLqOqX/+8mbhjg==&#34;,&#xA;          &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;          &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;          &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;          &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;            &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;          &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: {&#xA;          &#34;id&#34;: &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;,&#xA;          &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;          &#34;version&#34;: &#34;2:4.9-12.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;4.9-12.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: {&#xA;          &#34;id&#34;: &#34;OCIjbR16ktOEiFK36r0WNw==&#34;,&#xA;          &#34;name&#34;: &#34;libtasn1&#34;,&#xA;          &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: {&#xA;          &#34;id&#34;: &#34;OaFmq38HlbKLTTEM/qATzg==&#34;,&#xA;          &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;          &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;          &#34;name&#34;: &#34;npth&#34;,&#xA;          &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;npth&#34;,&#xA;            &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;,&#xA;          &#34;name&#34;: &#34;bash&#34;,&#xA;          &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bash&#34;,&#xA;            &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;,&#xA;          &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;          &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: {&#xA;          &#34;id&#34;: &#34;PIk2BBAWexCFofMi5q03RA==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: {&#xA;          &#34;id&#34;: &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;,&#xA;          &#34;name&#34;: &#34;microdnf&#34;,&#xA;          &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;microdnf&#34;,&#xA;            &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: {&#xA;          &#34;id&#34;: &#34;RXh3fimX8fGZeCt4chJEiA==&#34;,&#xA;          &#34;name&#34;: &#34;librhsm&#34;,&#xA;          &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librhsm&#34;,&#xA;            &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: {&#xA;          &#34;id&#34;: &#34;S8p9UGak1oycptcpYp/1eg==&#34;,&#xA;          &#34;name&#34;: &#34;openldap&#34;,&#xA;          &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: {&#xA;          &#34;id&#34;: &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;,&#xA;          &#34;name&#34;: &#34;libblkid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: {&#xA;          &#34;id&#34;: &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;,&#xA;          &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bzip2&#34;,&#xA;            &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;          &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;          &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;          &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;            &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;          &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;          &#34;name&#34;: &#34;gpgme&#34;,&#xA;          &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gpgme&#34;,&#xA;            &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;          &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;          &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;          &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;            &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: {&#xA;          &#34;id&#34;: &#34;VX9V+Y680L2xf2tBREdpCw==&#34;,&#xA;          &#34;name&#34;: &#34;gmp&#34;,&#xA;          &#34;version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gmp&#34;,&#xA;            &#34;version&#34;: &#34;6.2.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: {&#xA;          &#34;id&#34;: &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;,&#xA;          &#34;name&#34;: &#34;libxml2&#34;,&#xA;          &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XG5+bW8np2NedSy/od6z8Q==&#34;,&#xA;          &#34;name&#34;: &#34;libacl&#34;,&#xA;          &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;acl&#34;,&#xA;            &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: {&#xA;          &#34;id&#34;: &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: {&#xA;          &#34;id&#34;: &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;,&#xA;          &#34;name&#34;: &#34;libgcc&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;          &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;          &#34;name&#34;: &#34;readline&#34;,&#xA;          &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;readline&#34;,&#xA;            &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: {&#xA;          &#34;id&#34;: &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider-so&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: {&#xA;          &#34;id&#34;: &#34;arLt5War9yeQ8auYn/Idmw==&#34;,&#xA;          &#34;name&#34;: &#34;nettle&#34;,&#xA;          &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nettle&#34;,&#xA;            &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: {&#xA;          &#34;id&#34;: &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;,&#xA;          &#34;name&#34;: &#34;glib2&#34;,&#xA;          &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;          &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;          &#34;name&#34;: &#34;grep&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;grep&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: {&#xA;          &#34;id&#34;: &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;,&#xA;          &#34;name&#34;: &#34;libffi&#34;,&#xA;          &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libffi&#34;,&#xA;            &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: {&#xA;          &#34;id&#34;: &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;,&#xA;          &#34;name&#34;: &#34;libsepol&#34;,&#xA;          &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsepol&#34;,&#xA;            &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;          &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;          &#34;name&#34;: &#34;libattr&#34;,&#xA;          &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;attr&#34;,&#xA;            &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: {&#xA;          &#34;id&#34;: &#34;de44cUqF23LvU0fOSvNRjA==&#34;,&#xA;          &#34;name&#34;: &#34;libevent&#34;,&#xA;          &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libevent&#34;,&#xA;            &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;          &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;          &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;          &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;            &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: {&#xA;          &#34;id&#34;: &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-common&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: {&#xA;          &#34;id&#34;: &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;,&#xA;          &#34;name&#34;: &#34;lua-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lua&#34;,&#xA;            &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: {&#xA;          &#34;id&#34;: &#34;eaygsCP+5IpdIryvw94Tcw==&#34;,&#xA;          &#34;name&#34;: &#34;rootfiles&#34;,&#xA;          &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rootfiles&#34;,&#xA;            &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: {&#xA;          &#34;id&#34;: &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;,&#xA;          &#34;name&#34;: &#34;libusbx&#34;,&#xA;          &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libusbx&#34;,&#xA;            &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: {&#xA;          &#34;id&#34;: &#34;gsKPriszRNKAqMnHK+dXgw==&#34;,&#xA;          &#34;name&#34;: &#34;libksba&#34;,&#xA;          &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libksba&#34;,&#xA;            &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;          &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;          &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lz4&#34;,&#xA;            &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: {&#xA;          &#34;id&#34;: &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;,&#xA;          &#34;name&#34;: &#34;librepo&#34;,&#xA;          &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librepo&#34;,&#xA;            &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: {&#xA;          &#34;id&#34;: &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;3.2.2-6.el9_5.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: {&#xA;          &#34;id&#34;: &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;,&#xA;          &#34;name&#34;: &#34;dnf-data&#34;,&#xA;          &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dnf&#34;,&#xA;            &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: {&#xA;          &#34;id&#34;: &#34;izPQpATHYfezyT+kcua/tQ==&#34;,&#xA;          &#34;name&#34;: &#34;gnutls&#34;,&#xA;          &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: {&#xA;          &#34;id&#34;: &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;,&#xA;          &#34;name&#34;: &#34;alternatives&#34;,&#xA;          &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;chkconfig&#34;,&#xA;            &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;,&#xA;          &#34;name&#34;: &#34;libcap&#34;,&#xA;          &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;,&#xA;          &#34;name&#34;: &#34;setup&#34;,&#xA;          &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;setup&#34;,&#xA;            &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: {&#xA;          &#34;id&#34;: &#34;kgbITSeRtKiT7enG8buGXw==&#34;,&#xA;          &#34;name&#34;: &#34;libcom_err&#34;,&#xA;          &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;            &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;          &#34;name&#34;: &#34;basesystem&#34;,&#xA;          &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;basesystem&#34;,&#xA;            &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: {&#xA;          &#34;id&#34;: &#34;kp6BaioAZ30jbVeZkkzokA==&#34;,&#xA;          &#34;name&#34;: &#34;libzstd&#34;,&#xA;          &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zstd&#34;,&#xA;            &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: {&#xA;          &#34;id&#34;: &#34;kvpHJLhsWpgEBJjx168pDg==&#34;,&#xA;          &#34;name&#34;: &#34;tzdata&#34;,&#xA;          &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;tzdata&#34;,&#xA;            &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;,&#xA;          &#34;name&#34;: &#34;libdnf&#34;,&#xA;          &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libdnf&#34;,&#xA;            &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: {&#xA;          &#34;id&#34;: &#34;lad8JH31WlI0MsNEYhUWlA==&#34;,&#xA;          &#34;name&#34;: &#34;glibc&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: {&#xA;          &#34;id&#34;: &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;,&#xA;          &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;          &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;          &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;          &#34;name&#34;: &#34;libyaml&#34;,&#xA;          &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libyaml&#34;,&#xA;            &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: {&#xA;          &#34;id&#34;: &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;,&#xA;          &#34;name&#34;: &#34;libuuid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: {&#xA;          &#34;id&#34;: &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: {&#xA;          &#34;id&#34;: &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;,&#xA;          &#34;name&#34;: &#34;redhat-release&#34;,&#xA;          &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;redhat-release&#34;,&#xA;            &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;          &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;          &#34;name&#34;: &#34;json-c&#34;,&#xA;          &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-c&#34;,&#xA;            &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: {&#xA;          &#34;id&#34;: &#34;rCLp3m64Catai9VuHvh3Lw==&#34;,&#xA;          &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;keyutils&#34;,&#xA;            &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;          &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;          &#34;name&#34;: &#34;gawk&#34;,&#xA;          &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;          &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;          &#34;name&#34;: &#34;mpfr&#34;,&#xA;          &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;mpfr&#34;,&#xA;            &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;          &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;          &#34;name&#34;: &#34;sed&#34;,&#xA;          &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sed&#34;,&#xA;            &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;          &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;          &#34;name&#34;: &#34;libunistring&#34;,&#xA;          &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libunistring&#34;,&#xA;            &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;          &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;          &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;            &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: {&#xA;          &#34;id&#34;: &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;,&#xA;          &#34;name&#34;: &#34;gnupg2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: {&#xA;          &#34;id&#34;: &#34;wCA3gMNtInqX1xg18QcnQg==&#34;,&#xA;          &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;          &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;            &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: {&#xA;          &#34;id&#34;: &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;,&#xA;          &#34;name&#34;: &#34;libarchive&#34;,&#xA;          &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;          &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;          &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;          &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;            &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: {&#xA;          &#34;id&#34;: &#34;xSopjH0yPtbnx33MBmtmuA==&#34;,&#xA;          &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: {&#xA;          &#34;id&#34;: &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;,&#xA;          &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;          &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;            &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: {&#xA;          &#34;id&#34;: &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;,&#xA;          &#34;name&#34;: &#34;libsemanage&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsemanage&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: {&#xA;          &#34;id&#34;: &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;,&#xA;          &#34;name&#34;: &#34;rpm&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;distributions&#34;: {&#xA;        &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;: {&#xA;          &#34;id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;          &#34;did&#34;: &#34;rhel&#34;,&#xA;          &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;          &#34;version&#34;: &#34;9&#34;,&#xA;          &#34;version_code_name&#34;: &#34;&#34;,&#xA;          &#34;version_id&#34;: &#34;9&#34;,&#xA;          &#34;arch&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;          &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;        }&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;: {&#xA;          &#34;id&#34;: &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;        },&#xA;        &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;: {&#xA;          &#34;id&#34;: &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;        }&#xA;      },&#xA;      &#34;environments&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ]&#xA;      },&#xA;      &#34;vulnerabilities&#34;: {&#xA;        &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;          &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;          &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;: {&#xA;          &#34;id&#34;: &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;          &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;          &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;          &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;          &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;          &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;          &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;          &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;          &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;          &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;          &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;          &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;          &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;          &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;          &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;          &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;          &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;          &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;          &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;          &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;          &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;          &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;          &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;          &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;          &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;          &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;          &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;          &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;          &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;          &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;          &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;          &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;          &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;          &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;          &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;          &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;          &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;          &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;          &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;          &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;          &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;          &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;          &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;          &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;          &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;          &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;          &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;          &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;          &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;          &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;          &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;L1pkWyFlg006sdV2pKTg4A==&#34;: {&#xA;          &#34;id&#34;: &#34;L1pkWyFlg006sdV2pKTg4A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;          &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;          &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;          &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;          &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;          &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;          &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;          &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;          &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;          &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;          &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;          &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;          &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;          &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;          &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;          &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;          &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;          &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;          &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;          &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;          &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;: {&#xA;          &#34;id&#34;: &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;          &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;: {&#xA;          &#34;id&#34;: &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;          &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;          &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;          &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;          &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;          &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;          &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;          &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;          &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;          &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;          &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;          &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;          &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;          &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;          &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;          &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;          &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;          &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;          &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;          &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;          &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;          &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;          &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;          &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;          &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;          &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;          &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;          &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;          &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;          &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;          &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;          &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;          &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;          &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;          &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;          &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;          &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;          &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;          &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;          &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;          &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;          &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;          &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;          &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;vQmd/px1n2vUjUceHOjVLA==&#34;: {&#xA;          &#34;id&#34;: &#34;vQmd/px1n2vUjUceHOjVLA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;          &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;          &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;          &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;          &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;          &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;          &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;          &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;package_vulnerabilities&#34;: {&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;vQmd/px1n2vUjUceHOjVLA==&#34;&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;HxI42iSjURjRki+uV6q/9w==&#34;&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          &#34;ymKqobod4xPivmLT/iq9oQ==&#34;&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;mYgwcPpa/l0bTZdysqbplg==&#34;&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;5BksN0izCeDRrtFMsNCyvg==&#34;&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;f6oGdnhZomBa/bs3snB3kA==&#34;&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;&#xA;        ]&#xA;      },&#xA;      &#34;enrichments&#34;: {}&#xA;    }&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-oci-attach-report: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry&#xA;    Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 4,&#xA;    &#x9;&#x9;&#34;warnings&#34;: [&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libnghttp2-1.43.0-6.el9 (CVE-2026-27135), libarchive-3.5.3-6.el9_6 (CVE-2026-4111, CVE-2026-4424), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15467), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965), gnupg2-2.3.3-4.el9 (CVE-2025-68973)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 6&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcap-2.48-9.el9_2 (CVE-2026-4878), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40356)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libmount-2.37.4-21.el9 (CVE-2025-14104), libuuid-2.37.4-21.el9 (CVE-2025-14104), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libblkid-2.37.4-21.el9 (CVE-2025-14104), glib2-2.68.4-16.el9_6.2 (CVE-2025-13601), libarchive-3.5.3-6.el9_6 (CVE-2026-5121), libsmartcols-2.37.4-21.el9 (CVE-2025-14104), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), gnutls-3.8.3-6.el9_6.2 (CVE-2025-14831), glibc-2.34-168.el9_6.23 (CVE-2026-0915), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 15&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9 (CVE-2026-27456), libuuid-2.37.4-21.el9 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), systemd-libs-252-51.el9_6.2 (CVE-2026-29111, CVE-2026-4105), libblkid-2.37.4-21.el9 (CVE-2026-27456), glib2-2.68.4-16.el9_6.2 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libsmartcols-2.37.4-21.el9 (CVE-2026-27456), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libxml2-2.9.13-12.el9_6 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2026-28386, CVE-2026-28390, CVE-2026-31790), openldap-2.6.8-4.el9 (CVE-2026-22185), gnupg2-2.3.3-4.el9 (CVE-2025-68972), glibc-common-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40355), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 52&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gnutls-3.8.3-6.el9_6.2 (CVE-2025-9820), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), glibc-2.34-168.el9_6.23 (CVE-2025-15281, CVE-2026-0861)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 13&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4438), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libtasn1-4.16.0-9.el9 (CVE-2025-13151), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), pcre2-10.40-6.el9 (CVE-2022-41409), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), openssl-fips-provider-so-3.0.7-6.el9_5 (CVE-2026-2673), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232, CVE-2025-70873), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), glibc-common-2.34-168.el9_6.23 (CVE-2026-4438), glibc-2.34-168.el9_6.23 (CVE-2026-4438), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), openssl-fips-provider-3.0.7-6.el9_5 (CVE-2026-2673), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 55&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;]&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:6,&#34;medium&#34;:15,&#34;low&#34;:13,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:2,&#34;medium&#34;:52,&#34;low&#34;:55,&#34;unknown&#34;:0}}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;, &#34;digests&#34;: [&#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;]}}&#xA;    {&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-29T11:36:02+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | init container: prepare&#xA;    2026/04/29 11:20:29 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | init container: prepare&#xA;    2026/04/29 11:44:56 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare\n2026/04/29 11:06:16 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: \ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare\n2026/04/29 11:33:39 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-04-29T11:34:22Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare\n2026/04/29 11:32:59 Entrypoint initialization\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts\n2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: \nInspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: \nRunning clair-action on amd64 image manifest...\n\x1b[90m2026-04-29T11:34:39Z\x1b[0m \x1b[32mINF\x1b[0m \x1b[1mmatchers created\x1b[0m \x1b[36mcomponent=\x1b[0mlibvuln/New \x1b[36mmatchers=\x1b[0m[{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/debian\&#34;,\&#34;name\&#34;:\&#34;debian-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc\&#34;,\&#34;name\&#34;:\&#34;rhel-container-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/suse\&#34;,\&#34;name\&#34;:\&#34;suse\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu\&#34;,\&#34;name\&#34;:\&#34;ubuntu-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/oracle\&#34;,\&#34;name\&#34;:\&#34;oracle\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/photon\&#34;,\&#34;name\&#34;:\&#34;photon\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/python\&#34;,\&#34;name\&#34;:\&#34;python\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel\&#34;,\&#34;name\&#34;:\&#34;rhel\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/clai...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000986ce0&gt;: &#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare&#xA;    2026/04/29 11:06:16 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare&#xA;    2026/04/29 11:33:39 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-04-29T11:34:22Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare&#xA;    2026/04/29 11:32:59 Entrypoint initialization&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts&#xA;    2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: &#xA;    Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: &#xA;    Running clair-action on amd64 image manifest...&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;}]&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mCheckManifest&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexManifest&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    {&#xA;      &#34;manifest_hash&#34;: &#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;,&#xA;      &#34;packages&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;          &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;          &#34;name&#34;: &#34;libidn2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libidn2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: {&#xA;          &#34;id&#34;: &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;,&#xA;          &#34;name&#34;: &#34;libtool-ltdl&#34;,&#xA;          &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtool&#34;,&#xA;            &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: {&#xA;          &#34;id&#34;: &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;,&#xA;          &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;          &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;          &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;          &#34;name&#34;: &#34;xz-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: {&#xA;          &#34;id&#34;: &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;,&#xA;          &#34;name&#34;: &#34;libselinux&#34;,&#xA;          &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libselinux&#34;,&#xA;            &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: {&#xA;          &#34;id&#34;: &#34;/h/TBQhfoSMCmey5oN87jA==&#34;,&#xA;          &#34;name&#34;: &#34;libsolv&#34;,&#xA;          &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsolv&#34;,&#xA;            &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: {&#xA;          &#34;id&#34;: &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;,&#xA;          &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: {&#xA;          &#34;id&#34;: &#34;0T19Aon0dgLleTpQjLWzKw==&#34;,&#xA;          &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;          &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;            &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: {&#xA;          &#34;id&#34;: &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;,&#xA;          &#34;name&#34;: &#34;file-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;file&#34;,&#xA;            &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: {&#xA;          &#34;id&#34;: &#34;2gCbp4kt+cF44NF/LqukDg==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: {&#xA;          &#34;id&#34;: &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: {&#xA;          &#34;id&#34;: &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;,&#xA;          &#34;name&#34;: &#34;audit-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;audit&#34;,&#xA;            &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: {&#xA;          &#34;id&#34;: &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: {&#xA;          &#34;id&#34;: &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;,&#xA;          &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:1.23-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gdbm&#34;,&#xA;            &#34;version&#34;: &#34;1.23-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: {&#xA;          &#34;id&#34;: &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;,&#xA;          &#34;name&#34;: &#34;zlib&#34;,&#xA;          &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: {&#xA;          &#34;id&#34;: &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;,&#xA;          &#34;name&#34;: &#34;libmount&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: {&#xA;          &#34;id&#34;: &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;,&#xA;          &#34;name&#34;: &#34;libpeas&#34;,&#xA;          &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libpeas&#34;,&#xA;            &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: {&#xA;          &#34;id&#34;: &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9olIUlLHZMdoUMju+8diyQ==&#34;,&#xA;          &#34;name&#34;: &#34;filesystem&#34;,&#xA;          &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;filesystem&#34;,&#xA;            &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;          &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;          &#34;name&#34;: &#34;libassuan&#34;,&#xA;          &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libassuan&#34;,&#xA;            &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: {&#xA;          &#34;id&#34;: &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;,&#xA;          &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;          &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;            &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: {&#xA;          &#34;id&#34;: &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;,&#xA;          &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;          &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;          &#34;name&#34;: &#34;libverto&#34;,&#xA;          &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libverto&#34;,&#xA;            &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: {&#xA;          &#34;id&#34;: &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: {&#xA;          &#34;id&#34;: &#34;FrUQI+koTfbikRk1jsFd0w==&#34;,&#xA;          &#34;name&#34;: &#34;libstdc++&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;          &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;          &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;          &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;            &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;,&#xA;          &#34;name&#34;: &#34;pcre&#34;,&#xA;          &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre&#34;,&#xA;            &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;          &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;          &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libreport&#34;,&#xA;            &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: {&#xA;          &#34;id&#34;: &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;,&#xA;          &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;          &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nghttp2&#34;,&#xA;            &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;          &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;          &#34;name&#34;: &#34;json-glib&#34;,&#xA;          &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-glib&#34;,&#xA;            &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: {&#xA;          &#34;id&#34;: &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;,&#xA;          &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;          &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;          &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;          &#34;name&#34;: &#34;popt&#34;,&#xA;          &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;popt&#34;,&#xA;            &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: {&#xA;          &#34;id&#34;: &#34;M9YTWinowLqOqX/+8mbhjg==&#34;,&#xA;          &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;          &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;          &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;          &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;            &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;          &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: {&#xA;          &#34;id&#34;: &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;,&#xA;          &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;          &#34;version&#34;: &#34;2:4.9-12.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;4.9-12.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: {&#xA;          &#34;id&#34;: &#34;OCIjbR16ktOEiFK36r0WNw==&#34;,&#xA;          &#34;name&#34;: &#34;libtasn1&#34;,&#xA;          &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: {&#xA;          &#34;id&#34;: &#34;OaFmq38HlbKLTTEM/qATzg==&#34;,&#xA;          &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;          &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;          &#34;name&#34;: &#34;npth&#34;,&#xA;          &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;npth&#34;,&#xA;            &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;,&#xA;          &#34;name&#34;: &#34;bash&#34;,&#xA;          &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bash&#34;,&#xA;            &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;,&#xA;          &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;          &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: {&#xA;          &#34;id&#34;: &#34;PIk2BBAWexCFofMi5q03RA==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: {&#xA;          &#34;id&#34;: &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;,&#xA;          &#34;name&#34;: &#34;microdnf&#34;,&#xA;          &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;microdnf&#34;,&#xA;            &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: {&#xA;          &#34;id&#34;: &#34;RXh3fimX8fGZeCt4chJEiA==&#34;,&#xA;          &#34;name&#34;: &#34;librhsm&#34;,&#xA;          &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librhsm&#34;,&#xA;            &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: {&#xA;          &#34;id&#34;: &#34;S8p9UGak1oycptcpYp/1eg==&#34;,&#xA;          &#34;name&#34;: &#34;openldap&#34;,&#xA;          &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: {&#xA;          &#34;id&#34;: &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;,&#xA;          &#34;name&#34;: &#34;libblkid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: {&#xA;          &#34;id&#34;: &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;,&#xA;          &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bzip2&#34;,&#xA;            &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;          &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;          &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;          &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;            &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;          &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;          &#34;name&#34;: &#34;gpgme&#34;,&#xA;          &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gpgme&#34;,&#xA;            &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;          &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;          &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;          &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;            &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: {&#xA;          &#34;id&#34;: &#34;VX9V+Y680L2xf2tBREdpCw==&#34;,&#xA;          &#34;name&#34;: &#34;gmp&#34;,&#xA;          &#34;version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gmp&#34;,&#xA;            &#34;version&#34;: &#34;6.2.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: {&#xA;          &#34;id&#34;: &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;,&#xA;          &#34;name&#34;: &#34;libxml2&#34;,&#xA;          &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XG5+bW8np2NedSy/od6z8Q==&#34;,&#xA;          &#34;name&#34;: &#34;libacl&#34;,&#xA;          &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;acl&#34;,&#xA;            &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: {&#xA;          &#34;id&#34;: &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: {&#xA;          &#34;id&#34;: &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;,&#xA;          &#34;name&#34;: &#34;libgcc&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;          &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;          &#34;name&#34;: &#34;readline&#34;,&#xA;          &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;readline&#34;,&#xA;            &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: {&#xA;          &#34;id&#34;: &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider-so&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: {&#xA;          &#34;id&#34;: &#34;arLt5War9yeQ8auYn/Idmw==&#34;,&#xA;          &#34;name&#34;: &#34;nettle&#34;,&#xA;          &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nettle&#34;,&#xA;            &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: {&#xA;          &#34;id&#34;: &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;,&#xA;          &#34;name&#34;: &#34;glib2&#34;,&#xA;          &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;          &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;          &#34;name&#34;: &#34;grep&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;grep&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: {&#xA;          &#34;id&#34;: &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;,&#xA;          &#34;name&#34;: &#34;libffi&#34;,&#xA;          &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libffi&#34;,&#xA;            &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: {&#xA;          &#34;id&#34;: &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;,&#xA;          &#34;name&#34;: &#34;libsepol&#34;,&#xA;          &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsepol&#34;,&#xA;            &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;          &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;          &#34;name&#34;: &#34;libattr&#34;,&#xA;          &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;attr&#34;,&#xA;            &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: {&#xA;          &#34;id&#34;: &#34;de44cUqF23LvU0fOSvNRjA==&#34;,&#xA;          &#34;name&#34;: &#34;libevent&#34;,&#xA;          &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libevent&#34;,&#xA;            &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;          &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;          &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;          &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;            &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: {&#xA;          &#34;id&#34;: &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-common&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: {&#xA;          &#34;id&#34;: &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;,&#xA;          &#34;name&#34;: &#34;lua-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lua&#34;,&#xA;            &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: {&#xA;          &#34;id&#34;: &#34;eaygsCP+5IpdIryvw94Tcw==&#34;,&#xA;          &#34;name&#34;: &#34;rootfiles&#34;,&#xA;          &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rootfiles&#34;,&#xA;            &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: {&#xA;          &#34;id&#34;: &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;,&#xA;          &#34;name&#34;: &#34;libusbx&#34;,&#xA;          &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libusbx&#34;,&#xA;            &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: {&#xA;          &#34;id&#34;: &#34;gsKPriszRNKAqMnHK+dXgw==&#34;,&#xA;          &#34;name&#34;: &#34;libksba&#34;,&#xA;          &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libksba&#34;,&#xA;            &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;          &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;          &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lz4&#34;,&#xA;            &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: {&#xA;          &#34;id&#34;: &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;,&#xA;          &#34;name&#34;: &#34;librepo&#34;,&#xA;          &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librepo&#34;,&#xA;            &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: {&#xA;          &#34;id&#34;: &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;3.2.2-6.el9_5.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: {&#xA;          &#34;id&#34;: &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;,&#xA;          &#34;name&#34;: &#34;dnf-data&#34;,&#xA;          &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dnf&#34;,&#xA;            &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: {&#xA;          &#34;id&#34;: &#34;izPQpATHYfezyT+kcua/tQ==&#34;,&#xA;          &#34;name&#34;: &#34;gnutls&#34;,&#xA;          &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: {&#xA;          &#34;id&#34;: &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;,&#xA;          &#34;name&#34;: &#34;alternatives&#34;,&#xA;          &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;chkconfig&#34;,&#xA;            &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;,&#xA;          &#34;name&#34;: &#34;libcap&#34;,&#xA;          &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;,&#xA;          &#34;name&#34;: &#34;setup&#34;,&#xA;          &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;setup&#34;,&#xA;            &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: {&#xA;          &#34;id&#34;: &#34;kgbITSeRtKiT7enG8buGXw==&#34;,&#xA;          &#34;name&#34;: &#34;libcom_err&#34;,&#xA;          &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;            &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;          &#34;name&#34;: &#34;basesystem&#34;,&#xA;          &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;basesystem&#34;,&#xA;            &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: {&#xA;          &#34;id&#34;: &#34;kp6BaioAZ30jbVeZkkzokA==&#34;,&#xA;          &#34;name&#34;: &#34;libzstd&#34;,&#xA;          &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zstd&#34;,&#xA;            &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: {&#xA;          &#34;id&#34;: &#34;kvpHJLhsWpgEBJjx168pDg==&#34;,&#xA;          &#34;name&#34;: &#34;tzdata&#34;,&#xA;          &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;tzdata&#34;,&#xA;            &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;,&#xA;          &#34;name&#34;: &#34;libdnf&#34;,&#xA;          &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libdnf&#34;,&#xA;            &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: {&#xA;          &#34;id&#34;: &#34;lad8JH31WlI0MsNEYhUWlA==&#34;,&#xA;          &#34;name&#34;: &#34;glibc&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: {&#xA;          &#34;id&#34;: &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;,&#xA;          &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;          &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;          &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;          &#34;name&#34;: &#34;libyaml&#34;,&#xA;          &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libyaml&#34;,&#xA;            &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: {&#xA;          &#34;id&#34;: &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;,&#xA;          &#34;name&#34;: &#34;libuuid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: {&#xA;          &#34;id&#34;: &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: {&#xA;          &#34;id&#34;: &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;,&#xA;          &#34;name&#34;: &#34;redhat-release&#34;,&#xA;          &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;redhat-release&#34;,&#xA;            &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;          &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;          &#34;name&#34;: &#34;json-c&#34;,&#xA;          &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-c&#34;,&#xA;            &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: {&#xA;          &#34;id&#34;: &#34;rCLp3m64Catai9VuHvh3Lw==&#34;,&#xA;          &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;keyutils&#34;,&#xA;            &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;          &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;          &#34;name&#34;: &#34;gawk&#34;,&#xA;          &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;          &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;          &#34;name&#34;: &#34;mpfr&#34;,&#xA;          &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;mpfr&#34;,&#xA;            &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;          &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;          &#34;name&#34;: &#34;sed&#34;,&#xA;          &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sed&#34;,&#xA;            &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;          &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;          &#34;name&#34;: &#34;libunistring&#34;,&#xA;          &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libunistring&#34;,&#xA;            &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;          &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;          &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;            &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: {&#xA;          &#34;id&#34;: &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;,&#xA;          &#34;name&#34;: &#34;gnupg2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: {&#xA;          &#34;id&#34;: &#34;wCA3gMNtInqX1xg18QcnQg==&#34;,&#xA;          &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;          &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;            &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: {&#xA;          &#34;id&#34;: &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;,&#xA;          &#34;name&#34;: &#34;libarchive&#34;,&#xA;          &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;          &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;          &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;          &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;            &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: {&#xA;          &#34;id&#34;: &#34;xSopjH0yPtbnx33MBmtmuA==&#34;,&#xA;          &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: {&#xA;          &#34;id&#34;: &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;,&#xA;          &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;          &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;            &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: {&#xA;          &#34;id&#34;: &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;,&#xA;          &#34;name&#34;: &#34;libsemanage&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsemanage&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: {&#xA;          &#34;id&#34;: &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;,&#xA;          &#34;name&#34;: &#34;rpm&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;distributions&#34;: {&#xA;        &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;: {&#xA;          &#34;id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;          &#34;did&#34;: &#34;rhel&#34;,&#xA;          &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;          &#34;version&#34;: &#34;9&#34;,&#xA;          &#34;version_code_name&#34;: &#34;&#34;,&#xA;          &#34;version_id&#34;: &#34;9&#34;,&#xA;          &#34;arch&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;          &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;        }&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;: {&#xA;          &#34;id&#34;: &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;        },&#xA;        &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;: {&#xA;          &#34;id&#34;: &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;        }&#xA;      },&#xA;      &#34;environments&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ]&#xA;      },&#xA;      &#34;vulnerabilities&#34;: {&#xA;        &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;          &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;          &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;: {&#xA;          &#34;id&#34;: &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;          &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;          &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;          &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;          &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;          &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;          &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;          &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;          &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;          &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;          &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;          &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;          &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;          &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;          &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;          &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;          &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;          &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;          &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;          &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;          &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;          &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;          &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;          &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;          &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;          &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;          &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;          &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;          &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;          &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;          &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;          &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;          &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;          &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;          &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;          &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;          &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;          &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;          &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;          &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;          &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;          &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;          &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;          &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;          &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;          &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;          &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;          &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;          &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;          &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;          &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;L1pkWyFlg006sdV2pKTg4A==&#34;: {&#xA;          &#34;id&#34;: &#34;L1pkWyFlg006sdV2pKTg4A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;          &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;          &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;          &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;          &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;          &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;          &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;          &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;          &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;          &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;          &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;          &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;          &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;          &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;          &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;          &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;          &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;          &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;          &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;          &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;          &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;: {&#xA;          &#34;id&#34;: &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;          &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;: {&#xA;          &#34;id&#34;: &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;          &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;          &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;          &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;          &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;          &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;          &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;          &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;          &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;          &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;          &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;          &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;          &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;          &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;          &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;          &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;          &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;          &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;          &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;          &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;          &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;          &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;          &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;          &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;          &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;          &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;          &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;          &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;          &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;          &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;          &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;          &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;          &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;          &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;          &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;          &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;          &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;          &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;          &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;          &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;          &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;          &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;          &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;          &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;vQmd/px1n2vUjUceHOjVLA==&#34;: {&#xA;          &#34;id&#34;: &#34;vQmd/px1n2vUjUceHOjVLA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;          &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;          &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;          &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;          &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;          &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;          &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;          &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;package_vulnerabilities&#34;: {&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;vQmd/px1n2vUjUceHOjVLA==&#34;&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;HxI42iSjURjRki+uV6q/9w==&#34;&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          &#34;ymKqobod4xPivmLT/iq9oQ==&#34;&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;mYgwcPpa/l0bTZdysqbplg==&#34;&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;5BksN0izCeDRrtFMsNCyvg==&#34;&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;f6oGdnhZomBa/bs3snB3kA==&#34;&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;&#xA;        ]&#xA;      },&#xA;      &#34;enrichments&#34;: {}&#xA;    }&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-oci-attach-report: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry&#xA;    Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 4,&#xA;    &#x9;&#x9;&#34;warnings&#34;: [&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libnghttp2-1.43.0-6.el9 (CVE-2026-27135), libarchive-3.5.3-6.el9_6 (CVE-2026-4111, CVE-2026-4424), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15467), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965), gnupg2-2.3.3-4.el9 (CVE-2025-68973)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 6&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcap-2.48-9.el9_2 (CVE-2026-4878), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40356)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libmount-2.37.4-21.el9 (CVE-2025-14104), libuuid-2.37.4-21.el9 (CVE-2025-14104), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libblkid-2.37.4-21.el9 (CVE-2025-14104), glib2-2.68.4-16.el9_6.2 (CVE-2025-13601), libarchive-3.5.3-6.el9_6 (CVE-2026-5121), libsmartcols-2.37.4-21.el9 (CVE-2025-14104), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), gnutls-3.8.3-6.el9_6.2 (CVE-2025-14831), glibc-2.34-168.el9_6.23 (CVE-2026-0915), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 15&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9 (CVE-2026-27456), libuuid-2.37.4-21.el9 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), systemd-libs-252-51.el9_6.2 (CVE-2026-29111, CVE-2026-4105), libblkid-2.37.4-21.el9 (CVE-2026-27456), glib2-2.68.4-16.el9_6.2 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libsmartcols-2.37.4-21.el9 (CVE-2026-27456), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libxml2-2.9.13-12.el9_6 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2026-28386, CVE-2026-28390, CVE-2026-31790), openldap-2.6.8-4.el9 (CVE-2026-22185), gnupg2-2.3.3-4.el9 (CVE-2025-68972), glibc-common-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40355), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 52&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gnutls-3.8.3-6.el9_6.2 (CVE-2025-9820), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), glibc-2.34-168.el9_6.23 (CVE-2025-15281, CVE-2026-0861)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 13&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4438), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libtasn1-4.16.0-9.el9 (CVE-2025-13151), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), pcre2-10.40-6.el9 (CVE-2022-41409), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), openssl-fips-provider-so-3.0.7-6.el9_5 (CVE-2026-2673), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232, CVE-2025-70873), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), glibc-common-2.34-168.el9_6.23 (CVE-2026-4438), glibc-2.34-168.el9_6.23 (CVE-2026-4438), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), openssl-fips-provider-3.0.7-6.el9_5 (CVE-2026-2673), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 55&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;]&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:6,&#34;medium&#34;:15,&#34;low&#34;:13,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:2,&#34;medium&#34;:52,&#34;low&#34;:55,&#34;unknown&#34;:0}}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;, &#34;digests&#34;: [&#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;]}}&#xA;    {&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-29T11:36:02+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | init container: prepare&#xA;    2026/04/29 11:20:29 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | init container: prepare&#xA;    2026/04/29 11:44:56 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare\n2026/04/29 11:06:16 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: \ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare\n2026/04/29 11:33:39 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-04-29T11:34:22Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare\n2026/04/29 11:32:59 Entrypoint initialization\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts\n2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: \nInspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: \nRunning clair-action on amd64 image manifest...\n\x1b[90m2026-04-29T11:34:39Z\x1b[0m \x1b[32mINF\x1b[0m \x1b[1mmatchers created\x1b[0m \x1b[36mcomponent=\x1b[0mlibvuln/New \x1b[36mmatchers=\x1b[0m[{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/debian\&#34;,\&#34;name\&#34;:\&#34;debian-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc\&#34;,\&#34;name\&#34;:\&#34;rhel-container-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/suse\&#34;,\&#34;name\&#34;:\&#34;suse\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu\&#34;,\&#34;name\&#34;:\&#34;ubuntu-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/oracle\&#34;,\&#34;name\&#34;:\&#34;oracle\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/photon\&#34;,\&#34;name\&#34;:\&#34;photon\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/python\&#34;,\&#34;name\&#34;:\&#34;python\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel\&#34;,\&#34;name\&#34;:\&#34;rhel\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/clai...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:403 @ 04/29/26 11:46:48.363&#xA;</failure>
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 11:12:15.653&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z found for Component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-2b46z reason: PipelineRunStopping&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-parent-qdry-on-push-2b46z&#34; failed: context deadline exceededNew PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 found after retrigger for component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 found for Component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: &#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: &#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-zfmq7 reason: Failed&#xA;attempt 2/3: PipelineRun &#34;gh-multi-component-parent-qdry-on-push-zfmq7&#34; failed: &#xA; pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare&#xA;2026/04/29 11:06:16 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare&#xA;2026/04/29 11:33:39 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;&#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;&#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-29T11:34:22Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare&#xA;2026/04/29 11:32:59 Entrypoint initialization&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts&#xA;2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;}]&#xA;�[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: {&#xA;      &#34;id&#34;: &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;,&#xA;      &#34;name&#34;: &#34;libtool-ltdl&#34;,&#xA;      &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtool&#34;,&#xA;        &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: {&#xA;      &#34;id&#34;: &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;      &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;      &#34;name&#34;: &#34;xz-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: {&#xA;      &#34;id&#34;: &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux&#34;,&#xA;      &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: {&#xA;      &#34;id&#34;: &#34;/h/TBQhfoSMCmey5oN87jA==&#34;,&#xA;      &#34;name&#34;: &#34;libsolv&#34;,&#xA;      &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsolv&#34;,&#xA;        &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: {&#xA;      &#34;id&#34;: &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: {&#xA;      &#34;id&#34;: &#34;0T19Aon0dgLleTpQjLWzKw==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;      &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: {&#xA;      &#34;id&#34;: &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;,&#xA;      &#34;name&#34;: &#34;file-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: {&#xA;      &#34;id&#34;: &#34;2gCbp4kt+cF44NF/LqukDg==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;      &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: {&#xA;      &#34;id&#34;: &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;      &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: {&#xA;      &#34;id&#34;: &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;,&#xA;      &#34;name&#34;: &#34;audit-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: {&#xA;      &#34;id&#34;: &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: {&#xA;      &#34;id&#34;: &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.23-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.23-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;,&#xA;      &#34;name&#34;: &#34;zlib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;,&#xA;      &#34;name&#34;: &#34;libmount&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: {&#xA;      &#34;id&#34;: &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;,&#xA;      &#34;name&#34;: &#34;libpeas&#34;,&#xA;      &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpeas&#34;,&#xA;        &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: {&#xA;      &#34;id&#34;: &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit&#34;,&#xA;      &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9olIUlLHZMdoUMju+8diyQ==&#34;,&#xA;      &#34;name&#34;: &#34;filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;filesystem&#34;,&#xA;        &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;      &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;      &#34;name&#34;: &#34;libassuan&#34;,&#xA;      &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libassuan&#34;,&#xA;        &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;,&#xA;      &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;      &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;        &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: {&#xA;      &#34;id&#34;: &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;,&#xA;      &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;      &#34;name&#34;: &#34;libverto&#34;,&#xA;      &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libverto&#34;,&#xA;        &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: {&#xA;      &#34;id&#34;: &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;      &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUQI+koTfbikRk1jsFd0w==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++&#34;,&#xA;      &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;      &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;      &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;      &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;        &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre&#34;,&#xA;      &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;      &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;      &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libreport&#34;,&#xA;        &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: {&#xA;      &#34;id&#34;: &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;,&#xA;      &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;      &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nghttp2&#34;,&#xA;        &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;      &#34;name&#34;: &#34;json-glib&#34;,&#xA;      &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-glib&#34;,&#xA;        &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: {&#xA;      &#34;id&#34;: &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;      &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;      &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;      &#34;name&#34;: &#34;popt&#34;,&#xA;      &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;popt&#34;,&#xA;        &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: {&#xA;      &#34;id&#34;: &#34;M9YTWinowLqOqX/+8mbhjg==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;      &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;      &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;      &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;,&#xA;      &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;      &#34;version&#34;: &#34;2:4.9-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;4.9-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: {&#xA;      &#34;id&#34;: &#34;OCIjbR16ktOEiFK36r0WNw==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: {&#xA;      &#34;id&#34;: &#34;OaFmq38HlbKLTTEM/qATzg==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;      &#34;name&#34;: &#34;npth&#34;,&#xA;      &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npth&#34;,&#xA;        &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: {&#xA;      &#34;id&#34;: &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;      &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: {&#xA;      &#34;id&#34;: &#34;PIk2BBAWexCFofMi5q03RA==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2&#34;,&#xA;      &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;,&#xA;      &#34;name&#34;: &#34;microdnf&#34;,&#xA;      &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;microdnf&#34;,&#xA;        &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: {&#xA;      &#34;id&#34;: &#34;RXh3fimX8fGZeCt4chJEiA==&#34;,&#xA;      &#34;name&#34;: &#34;librhsm&#34;,&#xA;      &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librhsm&#34;,&#xA;        &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: {&#xA;      &#34;id&#34;: &#34;S8p9UGak1oycptcpYp/1eg==&#34;,&#xA;      &#34;name&#34;: &#34;openldap&#34;,&#xA;      &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: {&#xA;      &#34;id&#34;: &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: {&#xA;      &#34;id&#34;: &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;      &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;      &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;      &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgme&#34;,&#xA;      &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;      &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;      &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: {&#xA;      &#34;id&#34;: &#34;VX9V+Y680L2xf2tBREdpCw==&#34;,&#xA;      &#34;name&#34;: &#34;gmp&#34;,&#xA;      &#34;version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;6.2.0-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2&#34;,&#xA;      &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XG5+bW8np2NedSy/od6z8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libacl&#34;,&#xA;      &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: {&#xA;      &#34;id&#34;: &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: {&#xA;      &#34;id&#34;: &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc&#34;,&#xA;      &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;      &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;      &#34;name&#34;: &#34;readline&#34;,&#xA;      &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: {&#xA;      &#34;id&#34;: &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-fips-provider-so&#34;,&#xA;      &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;arLt5War9yeQ8auYn/Idmw==&#34;: {&#xA;      &#34;id&#34;: &#34;arLt5War9yeQ8auYn/Idmw==&#34;,&#xA;      &#34;name&#34;: &#34;nettle&#34;,&#xA;      &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: {&#xA;      &#34;id&#34;: &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;,&#xA;      &#34;name&#34;: &#34;glib2&#34;,&#xA;      &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: {&#xA;      &#34;id&#34;: &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;,&#xA;      &#34;name&#34;: &#34;libffi&#34;,&#xA;      &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: {&#xA;      &#34;id&#34;: &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol&#34;,&#xA;      &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;      &#34;name&#34;: &#34;libattr&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;de44cUqF23LvU0fOSvNRjA==&#34;: {&#xA;      &#34;id&#34;: &#34;de44cUqF23LvU0fOSvNRjA==&#34;,&#xA;      &#34;name&#34;: &#34;libevent&#34;,&#xA;      &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libevent&#34;,&#xA;        &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;      &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;        &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: {&#xA;      &#34;id&#34;: &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-common&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: {&#xA;      &#34;id&#34;: &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;,&#xA;      &#34;name&#34;: &#34;lua-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: {&#xA;      &#34;id&#34;: &#34;eaygsCP+5IpdIryvw94Tcw==&#34;,&#xA;      &#34;name&#34;: &#34;rootfiles&#34;,&#xA;      &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rootfiles&#34;,&#xA;        &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;,&#xA;      &#34;name&#34;: &#34;libusbx&#34;,&#xA;      &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libusbx&#34;,&#xA;        &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: {&#xA;      &#34;id&#34;: &#34;gsKPriszRNKAqMnHK+dXgw==&#34;,&#xA;      &#34;name&#34;: &#34;libksba&#34;,&#xA;      &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libksba&#34;,&#xA;        &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;      &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;      &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: {&#xA;      &#34;id&#34;: &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;,&#xA;      &#34;name&#34;: &#34;librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: {&#xA;      &#34;id&#34;: &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;3.2.2-6.el9_5.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: {&#xA;      &#34;id&#34;: &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;,&#xA;      &#34;name&#34;: &#34;dnf-data&#34;,&#xA;      &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: {&#xA;      &#34;id&#34;: &#34;izPQpATHYfezyT+kcua/tQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnutls&#34;,&#xA;      &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;,&#xA;      &#34;name&#34;: &#34;alternatives&#34;,&#xA;      &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;chkconfig&#34;,&#xA;        &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcap&#34;,&#xA;      &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;,&#xA;      &#34;name&#34;: &#34;setup&#34;,&#xA;      &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setup&#34;,&#xA;        &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kgbITSeRtKiT7enG8buGXw==&#34;: {&#xA;      &#34;id&#34;: &#34;kgbITSeRtKiT7enG8buGXw==&#34;,&#xA;      &#34;name&#34;: &#34;libcom_err&#34;,&#xA;      &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;      &#34;name&#34;: &#34;basesystem&#34;,&#xA;      &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;basesystem&#34;,&#xA;        &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: {&#xA;      &#34;id&#34;: &#34;kp6BaioAZ30jbVeZkkzokA==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd&#34;,&#xA;      &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: {&#xA;      &#34;id&#34;: &#34;kvpHJLhsWpgEBJjx168pDg==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: {&#xA;      &#34;id&#34;: &#34;lad8JH31WlI0MsNEYhUWlA==&#34;,&#xA;      &#34;name&#34;: &#34;glibc&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: {&#xA;      &#34;id&#34;: &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;,&#xA;      &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;      &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;      &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;      &#34;name&#34;: &#34;libyaml&#34;,&#xA;      &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libyaml&#34;,&#xA;        &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: {&#xA;      &#34;id&#34;: &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;      &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: {&#xA;      &#34;id&#34;: &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-release&#34;,&#xA;      &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-release&#34;,&#xA;        &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;      &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;      &#34;name&#34;: &#34;json-c&#34;,&#xA;      &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-c&#34;,&#xA;        &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;rCLp3m64Catai9VuHvh3Lw==&#34;,&#xA;      &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;      &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;      &#34;name&#34;: &#34;gawk&#34;,&#xA;      &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;      &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;      &#34;name&#34;: &#34;mpfr&#34;,&#xA;      &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mpfr&#34;,&#xA;        &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;      &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;      &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;      &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: {&#xA;      &#34;id&#34;: &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;,&#xA;      &#34;name&#34;: &#34;gnupg2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: {&#xA;      &#34;id&#34;: &#34;wCA3gMNtInqX1xg18QcnQg==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: {&#xA;      &#34;id&#34;: &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;,&#xA;      &#34;name&#34;: &#34;libarchive&#34;,&#xA;      &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;      &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;      &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;      &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;        &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: {&#xA;      &#34;id&#34;: &#34;xSopjH0yPtbnx33MBmtmuA==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: {&#xA;      &#34;id&#34;: &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;,&#xA;      &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;      &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;        &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: {&#xA;      &#34;id&#34;: &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage&#34;,&#xA;      &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: {&#xA;      &#34;id&#34;: &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;,&#xA;      &#34;name&#34;: &#34;rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;: {&#xA;      &#34;id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;      &#34;did&#34;: &#34;rhel&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;      &#34;version&#34;: &#34;9&#34;,&#xA;      &#34;version_code_name&#34;: &#34;&#34;,&#xA;      &#34;version_id&#34;: &#34;9&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;: {&#xA;      &#34;id&#34;: &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;: {&#xA;      &#34;id&#34;: &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;arLt5War9yeQ8auYn/Idmw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;de44cUqF23LvU0fOSvNRjA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kgbITSeRtKiT7enG8buGXw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;      &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;: {&#xA;      &#34;id&#34;: &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;      &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;      &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;      &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;      &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;      &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;      &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;      &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;      &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;      &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;      &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;      &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;      &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;      &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;      &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;      &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;      &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;      &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;      &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;      &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;      &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;      &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;      &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;      &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;      &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;      &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;      &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;      &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;      &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;      &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;      &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;      &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;      &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;      &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;      &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;      &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;      &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;      &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;      &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;      &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;      &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;      &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L1pkWyFlg006sdV2pKTg4A==&#34;: {&#xA;      &#34;id&#34;: &#34;L1pkWyFlg006sdV2pKTg4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;      &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;      &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;      &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;      &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;      &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;      &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;      &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;      &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;      &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;      &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;      &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;      &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;      &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;      &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;      &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;      &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;      &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;      &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;      &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;      &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;      &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;      &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;      &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;      &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;      &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;      &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;      &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;      &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;      &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;      &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;      &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;      &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;      &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;      &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;      &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;      &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;      &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;      &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;      &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;      &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;      &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;      &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;      &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;      &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;      &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;      &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;      &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;      &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;      &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;      &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;      &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;      &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;      &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;      &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;      &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vQmd/px1n2vUjUceHOjVLA==&#34;: {&#xA;      &#34;id&#34;: &#34;vQmd/px1n2vUjUceHOjVLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;      &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;      &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;      &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;      &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;      &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;      &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;    ],&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;      &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;      &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;    ],&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;      &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;    ],&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;      &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;      &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;      &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;&#xA;    ],&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;      &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;    ],&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;    ],&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;      &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;    ],&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;      &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;      &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;vQmd/px1n2vUjUceHOjVLA==&#34;&#xA;    ],&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;      &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;HxI42iSjURjRki+uV6q/9w==&#34;&#xA;    ],&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;      &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;    ],&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;      &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;&#xA;    ],&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;      &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;    ],&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;      &#34;ymKqobod4xPivmLT/iq9oQ==&#34;&#xA;    ],&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;      &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;    ],&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;      &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;      &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;      &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;mYgwcPpa/l0bTZdysqbplg==&#34;&#xA;    ],&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;    ],&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;    ],&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;      &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;    ],&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;      &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;&#xA;    ],&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;    ],&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;      &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;      &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;      &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;5BksN0izCeDRrtFMsNCyvg==&#34;&#xA;    ],&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;      &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;f6oGdnhZomBa/bs3snB3kA==&#34;&#xA;    ],&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;      &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;&#xA;    ],&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;      &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;&#xA;    ],&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;      &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;    ],&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;      &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;      &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;    ],&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;      &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;      &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;&#xA;    ],&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;      &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 4,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libnghttp2-1.43.0-6.el9 (CVE-2026-27135), libarchive-3.5.3-6.el9_6 (CVE-2026-4111, CVE-2026-4424), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15467), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965), gnupg2-2.3.3-4.el9 (CVE-2025-68973)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 6&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcap-2.48-9.el9_2 (CVE-2026-4878), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40356)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libmount-2.37.4-21.el9 (CVE-2025-14104), libuuid-2.37.4-21.el9 (CVE-2025-14104), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libblkid-2.37.4-21.el9 (CVE-2025-14104), glib2-2.68.4-16.el9_6.2 (CVE-2025-13601), libarchive-3.5.3-6.el9_6 (CVE-2026-5121), libsmartcols-2.37.4-21.el9 (CVE-2025-14104), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), gnutls-3.8.3-6.el9_6.2 (CVE-2025-14831), glibc-2.34-168.el9_6.23 (CVE-2026-0915), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 15&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9 (CVE-2026-27456), libuuid-2.37.4-21.el9 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), systemd-libs-252-51.el9_6.2 (CVE-2026-29111, CVE-2026-4105), libblkid-2.37.4-21.el9 (CVE-2026-27456), glib2-2.68.4-16.el9_6.2 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libsmartcols-2.37.4-21.el9 (CVE-2026-27456), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libxml2-2.9.13-12.el9_6 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2026-28386, CVE-2026-28390, CVE-2026-31790), openldap-2.6.8-4.el9 (CVE-2026-22185), gnupg2-2.3.3-4.el9 (CVE-2025-68972), glibc-common-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40355), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 52&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gnutls-3.8.3-6.el9_6.2 (CVE-2025-9820), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), glibc-2.34-168.el9_6.23 (CVE-2025-15281, CVE-2026-0861)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 13&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4438), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libtasn1-4.16.0-9.el9 (CVE-2025-13151), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), pcre2-10.40-6.el9 (CVE-2022-41409), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), openssl-fips-provider-so-3.0.7-6.el9_5 (CVE-2026-2673), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232, CVE-2025-70873), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), glibc-common-2.34-168.el9_6.23 (CVE-2026-4438), glibc-2.34-168.el9_6.23 (CVE-2026-4438), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), openssl-fips-provider-3.0.7-6.el9_5 (CVE-2026-2673), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 55&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:6,&#34;medium&#34;:15,&#34;low&#34;:13,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:2,&#34;medium&#34;:52,&#34;low&#34;:55,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;, &#34;digests&#34;: [&#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-29T11:36:02+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | init container: prepare&#xA;2026/04/29 11:20:29 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-zfmq7-init-pod | init container: prepare&#xA;2026/04/29 11:43:55 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-zfmq7-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:44:04Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-parent-qdry-on-push-45lcb found after retrigger for component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb found for Component build-e2e-sctz/gh-multi-component-parent-qdry&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Running&#xA;PipelineRun gh-multi-component-parent-qdry-on-push-45lcb reason: Failed&#xA;attempt 3/3: PipelineRun &#34;gh-multi-component-parent-qdry-on-push-45lcb&#34; failed: &#xA; pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare&#xA;2026/04/29 11:06:16 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare&#xA;2026/04/29 11:33:39 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;&#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;&#xA;time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-29T11:34:22Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare&#xA;2026/04/29 11:32:59 Entrypoint initialization&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts&#xA;2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw&#xA;2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;}]&#xA;�[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: {&#xA;      &#34;id&#34;: &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;,&#xA;      &#34;name&#34;: &#34;libtool-ltdl&#34;,&#xA;      &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtool&#34;,&#xA;        &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: {&#xA;      &#34;id&#34;: &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;      &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;      &#34;name&#34;: &#34;xz-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: {&#xA;      &#34;id&#34;: &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux&#34;,&#xA;      &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: {&#xA;      &#34;id&#34;: &#34;/h/TBQhfoSMCmey5oN87jA==&#34;,&#xA;      &#34;name&#34;: &#34;libsolv&#34;,&#xA;      &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsolv&#34;,&#xA;        &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: {&#xA;      &#34;id&#34;: &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: {&#xA;      &#34;id&#34;: &#34;0T19Aon0dgLleTpQjLWzKw==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;      &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: {&#xA;      &#34;id&#34;: &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;,&#xA;      &#34;name&#34;: &#34;file-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: {&#xA;      &#34;id&#34;: &#34;2gCbp4kt+cF44NF/LqukDg==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;      &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: {&#xA;      &#34;id&#34;: &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;      &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: {&#xA;      &#34;id&#34;: &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;,&#xA;      &#34;name&#34;: &#34;audit-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: {&#xA;      &#34;id&#34;: &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: {&#xA;      &#34;id&#34;: &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.23-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.23-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;,&#xA;      &#34;name&#34;: &#34;zlib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;,&#xA;      &#34;name&#34;: &#34;libmount&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: {&#xA;      &#34;id&#34;: &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;,&#xA;      &#34;name&#34;: &#34;libpeas&#34;,&#xA;      &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpeas&#34;,&#xA;        &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: {&#xA;      &#34;id&#34;: &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit&#34;,&#xA;      &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9olIUlLHZMdoUMju+8diyQ==&#34;,&#xA;      &#34;name&#34;: &#34;filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;filesystem&#34;,&#xA;        &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;      &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;      &#34;name&#34;: &#34;libassuan&#34;,&#xA;      &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libassuan&#34;,&#xA;        &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;,&#xA;      &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;      &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;        &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: {&#xA;      &#34;id&#34;: &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;,&#xA;      &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;      &#34;name&#34;: &#34;libverto&#34;,&#xA;      &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libverto&#34;,&#xA;        &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: {&#xA;      &#34;id&#34;: &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;      &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUQI+koTfbikRk1jsFd0w==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++&#34;,&#xA;      &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;      &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;      &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;      &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;        &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre&#34;,&#xA;      &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;      &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;      &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libreport&#34;,&#xA;        &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: {&#xA;      &#34;id&#34;: &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;,&#xA;      &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;      &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nghttp2&#34;,&#xA;        &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;      &#34;name&#34;: &#34;json-glib&#34;,&#xA;      &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-glib&#34;,&#xA;        &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: {&#xA;      &#34;id&#34;: &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;      &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;      &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;      &#34;name&#34;: &#34;popt&#34;,&#xA;      &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;popt&#34;,&#xA;        &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: {&#xA;      &#34;id&#34;: &#34;M9YTWinowLqOqX/+8mbhjg==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;      &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;      &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;      &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;,&#xA;      &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;      &#34;version&#34;: &#34;2:4.9-12.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;4.9-12.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: {&#xA;      &#34;id&#34;: &#34;OCIjbR16ktOEiFK36r0WNw==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: {&#xA;      &#34;id&#34;: &#34;OaFmq38HlbKLTTEM/qATzg==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;      &#34;name&#34;: &#34;npth&#34;,&#xA;      &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npth&#34;,&#xA;        &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: {&#xA;      &#34;id&#34;: &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;      &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: {&#xA;      &#34;id&#34;: &#34;PIk2BBAWexCFofMi5q03RA==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2&#34;,&#xA;      &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;,&#xA;      &#34;name&#34;: &#34;microdnf&#34;,&#xA;      &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;microdnf&#34;,&#xA;        &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: {&#xA;      &#34;id&#34;: &#34;RXh3fimX8fGZeCt4chJEiA==&#34;,&#xA;      &#34;name&#34;: &#34;librhsm&#34;,&#xA;      &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librhsm&#34;,&#xA;        &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: {&#xA;      &#34;id&#34;: &#34;S8p9UGak1oycptcpYp/1eg==&#34;,&#xA;      &#34;name&#34;: &#34;openldap&#34;,&#xA;      &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: {&#xA;      &#34;id&#34;: &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: {&#xA;      &#34;id&#34;: &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;      &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;      &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;      &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgme&#34;,&#xA;      &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;      &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;      &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: {&#xA;      &#34;id&#34;: &#34;VX9V+Y680L2xf2tBREdpCw==&#34;,&#xA;      &#34;name&#34;: &#34;gmp&#34;,&#xA;      &#34;version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;6.2.0-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2&#34;,&#xA;      &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XG5+bW8np2NedSy/od6z8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libacl&#34;,&#xA;      &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: {&#xA;      &#34;id&#34;: &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: {&#xA;      &#34;id&#34;: &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc&#34;,&#xA;      &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;      &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;      &#34;name&#34;: &#34;readline&#34;,&#xA;      &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: {&#xA;      &#34;id&#34;: &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-fips-provider-so&#34;,&#xA;      &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;arLt5War9yeQ8auYn/Idmw==&#34;: {&#xA;      &#34;id&#34;: &#34;arLt5War9yeQ8auYn/Idmw==&#34;,&#xA;      &#34;name&#34;: &#34;nettle&#34;,&#xA;      &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: {&#xA;      &#34;id&#34;: &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;,&#xA;      &#34;name&#34;: &#34;glib2&#34;,&#xA;      &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: {&#xA;      &#34;id&#34;: &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;,&#xA;      &#34;name&#34;: &#34;libffi&#34;,&#xA;      &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: {&#xA;      &#34;id&#34;: &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol&#34;,&#xA;      &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;      &#34;name&#34;: &#34;libattr&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;de44cUqF23LvU0fOSvNRjA==&#34;: {&#xA;      &#34;id&#34;: &#34;de44cUqF23LvU0fOSvNRjA==&#34;,&#xA;      &#34;name&#34;: &#34;libevent&#34;,&#xA;      &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libevent&#34;,&#xA;        &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;      &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;        &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: {&#xA;      &#34;id&#34;: &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-common&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: {&#xA;      &#34;id&#34;: &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;,&#xA;      &#34;name&#34;: &#34;lua-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: {&#xA;      &#34;id&#34;: &#34;eaygsCP+5IpdIryvw94Tcw==&#34;,&#xA;      &#34;name&#34;: &#34;rootfiles&#34;,&#xA;      &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rootfiles&#34;,&#xA;        &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: {&#xA;      &#34;id&#34;: &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;,&#xA;      &#34;name&#34;: &#34;libusbx&#34;,&#xA;      &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libusbx&#34;,&#xA;        &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: {&#xA;      &#34;id&#34;: &#34;gsKPriszRNKAqMnHK+dXgw==&#34;,&#xA;      &#34;name&#34;: &#34;libksba&#34;,&#xA;      &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libksba&#34;,&#xA;        &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;      &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;      &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: {&#xA;      &#34;id&#34;: &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;,&#xA;      &#34;name&#34;: &#34;librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: {&#xA;      &#34;id&#34;: &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;3.2.2-6.el9_5.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: {&#xA;      &#34;id&#34;: &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;,&#xA;      &#34;name&#34;: &#34;dnf-data&#34;,&#xA;      &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dnf&#34;,&#xA;        &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: {&#xA;      &#34;id&#34;: &#34;izPQpATHYfezyT+kcua/tQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnutls&#34;,&#xA;      &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;,&#xA;      &#34;name&#34;: &#34;alternatives&#34;,&#xA;      &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;chkconfig&#34;,&#xA;        &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcap&#34;,&#xA;      &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;,&#xA;      &#34;name&#34;: &#34;setup&#34;,&#xA;      &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setup&#34;,&#xA;        &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kgbITSeRtKiT7enG8buGXw==&#34;: {&#xA;      &#34;id&#34;: &#34;kgbITSeRtKiT7enG8buGXw==&#34;,&#xA;      &#34;name&#34;: &#34;libcom_err&#34;,&#xA;      &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;      &#34;name&#34;: &#34;basesystem&#34;,&#xA;      &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;basesystem&#34;,&#xA;        &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: {&#xA;      &#34;id&#34;: &#34;kp6BaioAZ30jbVeZkkzokA==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd&#34;,&#xA;      &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: {&#xA;      &#34;id&#34;: &#34;kvpHJLhsWpgEBJjx168pDg==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: {&#xA;      &#34;id&#34;: &#34;lad8JH31WlI0MsNEYhUWlA==&#34;,&#xA;      &#34;name&#34;: &#34;glibc&#34;,&#xA;      &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: {&#xA;      &#34;id&#34;: &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;,&#xA;      &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;      &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;      &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;      &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;      &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;      &#34;name&#34;: &#34;libyaml&#34;,&#xA;      &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libyaml&#34;,&#xA;        &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: {&#xA;      &#34;id&#34;: &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid&#34;,&#xA;      &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;      &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: {&#xA;      &#34;id&#34;: &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-release&#34;,&#xA;      &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-release&#34;,&#xA;        &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;      &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;      &#34;name&#34;: &#34;json-c&#34;,&#xA;      &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-c&#34;,&#xA;        &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;rCLp3m64Catai9VuHvh3Lw==&#34;,&#xA;      &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;      &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;      &#34;name&#34;: &#34;gawk&#34;,&#xA;      &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;      &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;      &#34;name&#34;: &#34;mpfr&#34;,&#xA;      &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mpfr&#34;,&#xA;        &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;      &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;      &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;      &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;        &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: {&#xA;      &#34;id&#34;: &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;,&#xA;      &#34;name&#34;: &#34;gnupg2&#34;,&#xA;      &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: {&#xA;      &#34;id&#34;: &#34;wCA3gMNtInqX1xg18QcnQg==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: {&#xA;      &#34;id&#34;: &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;,&#xA;      &#34;name&#34;: &#34;libarchive&#34;,&#xA;      &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;      &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;      &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;      &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;        &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: {&#xA;      &#34;id&#34;: &#34;xSopjH0yPtbnx33MBmtmuA==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: {&#xA;      &#34;id&#34;: &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;,&#xA;      &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;      &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;        &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: {&#xA;      &#34;id&#34;: &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage&#34;,&#xA;      &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: {&#xA;      &#34;id&#34;: &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;,&#xA;      &#34;name&#34;: &#34;rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;: {&#xA;      &#34;id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;      &#34;did&#34;: &#34;rhel&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;      &#34;version&#34;: &#34;9&#34;,&#xA;      &#34;version_code_name&#34;: &#34;&#34;,&#xA;      &#34;version_id&#34;: &#34;9&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;: {&#xA;      &#34;id&#34;: &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;: {&#xA;      &#34;id&#34;: &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;arLt5War9yeQ8auYn/Idmw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;de44cUqF23LvU0fOSvNRjA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kgbITSeRtKiT7enG8buGXw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;        ]&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;      &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;: {&#xA;      &#34;id&#34;: &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;      &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;      &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;      &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;      &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;      &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;      &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;      &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;      &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;      &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;      &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;      &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;      &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;      &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;      &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;      &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;      &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;      &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;      &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;      &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;      &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;      &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;      &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;      &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;      &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;      &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;      &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;      &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;      &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;      &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;      &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;      &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;      &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;      &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;      &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;      &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;      &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;      &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;      &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;      &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;      &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;      &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;      &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;      &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L1pkWyFlg006sdV2pKTg4A==&#34;: {&#xA;      &#34;id&#34;: &#34;L1pkWyFlg006sdV2pKTg4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;      &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;      &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;      &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;      &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;      &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;      &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;      &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;      &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;      &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;      &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;      &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;      &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;      &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;      &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmount&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;      &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;      &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;      &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;      &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;      &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;      &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;      &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;      &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;      &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;      &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;      &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;      &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;      &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;      &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;      &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;      &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;      &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;      &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;      &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;      &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;      &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;      &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;      &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;      &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;      &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;      &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;      &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;      &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;      &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;      &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;      &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;      &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;      &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;      &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;      &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;      &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;      &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;      &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;      &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;      &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;      &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;      &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libblkid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;vQmd/px1n2vUjUceHOjVLA==&#34;: {&#xA;      &#34;id&#34;: &#34;vQmd/px1n2vUjUceHOjVLA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;      &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;      &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;      &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;      &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libuuid&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;      &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;      &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;    ],&#xA;    &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;      &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;    ],&#xA;    &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;      &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;      &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;    ],&#xA;    &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;      &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;    ],&#xA;    &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;      &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;      &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;      &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;      &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;&#xA;    ],&#xA;    &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;      &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;    ],&#xA;    &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;    ],&#xA;    &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;      &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;    ],&#xA;    &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;      &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;      &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;      &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;      &#34;vQmd/px1n2vUjUceHOjVLA==&#34;&#xA;    ],&#xA;    &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;      &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;      &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;      &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;      &#34;HxI42iSjURjRki+uV6q/9w==&#34;&#xA;    ],&#xA;    &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;      &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;    ],&#xA;    &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;      &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;&#xA;    ],&#xA;    &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;      &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;      &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;    ],&#xA;    &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;      &#34;ymKqobod4xPivmLT/iq9oQ==&#34;&#xA;    ],&#xA;    &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;      &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;    ],&#xA;    &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;      &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;    ],&#xA;    &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;      &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;      &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;      &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;      &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;      &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;      &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;      &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;      &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;      &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;      &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;      &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;      &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;      &#34;mYgwcPpa/l0bTZdysqbplg==&#34;&#xA;    ],&#xA;    &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;    ],&#xA;    &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;      &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;    ],&#xA;    &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;      &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;    ],&#xA;    &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;      &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;      &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;      &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;      &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;      &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;      &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;      &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;      &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;      &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;      &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;      &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;&#xA;    ],&#xA;    &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;    ],&#xA;    &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;      &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;      &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;      &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;      &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;      &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;      &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;      &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;      &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;      &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;      &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;      &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;      &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;      &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;      &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;      &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;      &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;      &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;      &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;      &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;      &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;      &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;      &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;      &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;      &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;      &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;      &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;      &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;      &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;      &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;      &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;      &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;      &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;      &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;      &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;      &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;      &#34;5BksN0izCeDRrtFMsNCyvg==&#34;&#xA;    ],&#xA;    &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;      &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;      &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;      &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;      &#34;f6oGdnhZomBa/bs3snB3kA==&#34;&#xA;    ],&#xA;    &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;      &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;&#xA;    ],&#xA;    &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;      &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;      &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;      &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;      &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;      &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;      &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;      &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;      &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;      &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;      &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;      &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;      &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;&#xA;    ],&#xA;    &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;      &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;      &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;      &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;      &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;      &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;      &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;      &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;      &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;      &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;      &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;      &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;      &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;      &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;      &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;    ],&#xA;    &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;      &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;      &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;      &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;    ],&#xA;    &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;      &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;    ],&#xA;    &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;      &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;    ],&#xA;    &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;      &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;      &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;      &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;      &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;      &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;      &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;&#xA;    ],&#xA;    &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;      &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;      &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;      &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;      &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;      &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;      &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;      &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;      &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;      &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;      &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;      &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;      &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;      &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;      &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;      &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 4,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libnghttp2-1.43.0-6.el9 (CVE-2026-27135), libarchive-3.5.3-6.el9_6 (CVE-2026-4111, CVE-2026-4424), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15467), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965), gnupg2-2.3.3-4.el9 (CVE-2025-68973)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 6&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcap-2.48-9.el9_2 (CVE-2026-4878), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40356)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libmount-2.37.4-21.el9 (CVE-2025-14104), libuuid-2.37.4-21.el9 (CVE-2025-14104), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libblkid-2.37.4-21.el9 (CVE-2025-14104), glib2-2.68.4-16.el9_6.2 (CVE-2025-13601), libarchive-3.5.3-6.el9_6 (CVE-2026-5121), libsmartcols-2.37.4-21.el9 (CVE-2025-14104), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), gnutls-3.8.3-6.el9_6.2 (CVE-2025-14831), glibc-2.34-168.el9_6.23 (CVE-2026-0915), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 15&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9 (CVE-2026-27456), libuuid-2.37.4-21.el9 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), systemd-libs-252-51.el9_6.2 (CVE-2026-29111, CVE-2026-4105), libblkid-2.37.4-21.el9 (CVE-2026-27456), glib2-2.68.4-16.el9_6.2 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libsmartcols-2.37.4-21.el9 (CVE-2026-27456), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libxml2-2.9.13-12.el9_6 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2026-28386, CVE-2026-28390, CVE-2026-31790), openldap-2.6.8-4.el9 (CVE-2026-22185), gnupg2-2.3.3-4.el9 (CVE-2025-68972), glibc-common-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40355), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 52&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gnutls-3.8.3-6.el9_6.2 (CVE-2025-9820), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), glibc-2.34-168.el9_6.23 (CVE-2025-15281, CVE-2026-0861)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 13&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4438), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libtasn1-4.16.0-9.el9 (CVE-2025-13151), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), pcre2-10.40-6.el9 (CVE-2022-41409), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), openssl-fips-provider-so-3.0.7-6.el9_5 (CVE-2026-2673), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232, CVE-2025-70873), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), glibc-common-2.34-168.el9_6.23 (CVE-2026-4438), glibc-2.34-168.el9_6.23 (CVE-2026-4438), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), openssl-fips-provider-3.0.7-6.el9_5 (CVE-2026-2673), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 55&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:6,&#34;medium&#34;:15,&#34;low&#34;:13,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:2,&#34;medium&#34;:52,&#34;low&#34;:55,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;, &#34;digests&#34;: [&#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-29T11:36:02+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | init container: prepare&#xA;2026/04/29 11:20:29 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | init container: prepare&#xA;2026/04/29 11:44:56 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000986ce0&gt;: &#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare&#xA;    2026/04/29 11:06:16 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:06:19Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare&#xA;    2026/04/29 11:33:39 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;&#xA;    time=&#34;2026-04-29T11:34:21Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-04-29T11:34:22Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare&#xA;    2026/04/29 11:32:59 Entrypoint initialization&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts&#xA;    2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw&#xA;    2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: &#xA;    Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: &#xA;    Running clair-action on amd64 image manifest...&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;}]&#xA;    �[90m2026-04-29T11:34:39Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mCheckManifest&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mFetchLayers&#xA;    �[90m2026-04-29T11:34:41Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mScanLayers&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexManifest&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 �[36mstate=�[0mIndexFinished&#xA;    �[90m2026-04-29T11:34:42Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    {&#xA;      &#34;manifest_hash&#34;: &#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;,&#xA;      &#34;packages&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: {&#xA;          &#34;id&#34;: &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;,&#xA;          &#34;name&#34;: &#34;libidn2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libidn2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: {&#xA;          &#34;id&#34;: &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;,&#xA;          &#34;name&#34;: &#34;libtool-ltdl&#34;,&#xA;          &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtool&#34;,&#xA;            &#34;version&#34;: &#34;2.4.6-46.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: {&#xA;          &#34;id&#34;: &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;,&#xA;          &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;          &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;8.32-39.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: {&#xA;          &#34;id&#34;: &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;,&#xA;          &#34;name&#34;: &#34;xz-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;5.2.5-8.el9_0&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: {&#xA;          &#34;id&#34;: &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;,&#xA;          &#34;name&#34;: &#34;libselinux&#34;,&#xA;          &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libselinux&#34;,&#xA;            &#34;version&#34;: &#34;3.6-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: {&#xA;          &#34;id&#34;: &#34;/h/TBQhfoSMCmey5oN87jA==&#34;,&#xA;          &#34;name&#34;: &#34;libsolv&#34;,&#xA;          &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsolv&#34;,&#xA;            &#34;version&#34;: &#34;0.7.24-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: {&#xA;          &#34;id&#34;: &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;,&#xA;          &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: {&#xA;          &#34;id&#34;: &#34;0T19Aon0dgLleTpQjLWzKw==&#34;,&#xA;          &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;          &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;            &#34;version&#34;: &#34;20250128-1.git5269e22.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: {&#xA;          &#34;id&#34;: &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;,&#xA;          &#34;name&#34;: &#34;file-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;file&#34;,&#xA;            &#34;version&#34;: &#34;5.39-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: {&#xA;          &#34;id&#34;: &#34;2gCbp4kt+cF44NF/LqukDg==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2-syntax&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: {&#xA;          &#34;id&#34;: &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: {&#xA;          &#34;id&#34;: &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;,&#xA;          &#34;name&#34;: &#34;audit-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;audit&#34;,&#xA;            &#34;version&#34;: &#34;3.1.5-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: {&#xA;          &#34;id&#34;: &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: {&#xA;          &#34;id&#34;: &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;,&#xA;          &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:1.23-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gdbm&#34;,&#xA;            &#34;version&#34;: &#34;1.23-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: {&#xA;          &#34;id&#34;: &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;,&#xA;          &#34;name&#34;: &#34;zlib&#34;,&#xA;          &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;1.2.11-40.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: {&#xA;          &#34;id&#34;: &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;,&#xA;          &#34;name&#34;: &#34;libmount&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: {&#xA;          &#34;id&#34;: &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;,&#xA;          &#34;name&#34;: &#34;libpeas&#34;,&#xA;          &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libpeas&#34;,&#xA;            &#34;version&#34;: &#34;1.30.0-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: {&#xA;          &#34;id&#34;: &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;,&#xA;          &#34;name&#34;: &#34;p11-kit&#34;,&#xA;          &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;p11-kit&#34;,&#xA;            &#34;version&#34;: &#34;0.25.3-3.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9olIUlLHZMdoUMju+8diyQ==&#34;,&#xA;          &#34;name&#34;: &#34;filesystem&#34;,&#xA;          &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;filesystem&#34;,&#xA;            &#34;version&#34;: &#34;3.16-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: {&#xA;          &#34;id&#34;: &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;,&#xA;          &#34;name&#34;: &#34;libassuan&#34;,&#xA;          &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libassuan&#34;,&#xA;            &#34;version&#34;: &#34;2.5.5-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: {&#xA;          &#34;id&#34;: &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;,&#xA;          &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;          &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;            &#34;version&#34;: &#34;1.68.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: {&#xA;          &#34;id&#34;: &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;,&#xA;          &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;1.21.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: {&#xA;          &#34;id&#34;: &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;,&#xA;          &#34;name&#34;: &#34;libverto&#34;,&#xA;          &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libverto&#34;,&#xA;            &#34;version&#34;: &#34;0.3.2-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: {&#xA;          &#34;id&#34;: &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: {&#xA;          &#34;id&#34;: &#34;FrUQI+koTfbikRk1jsFd0w==&#34;,&#xA;          &#34;name&#34;: &#34;libstdc++&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: {&#xA;          &#34;id&#34;: &#34;G61ZL2SOHR2qgvQfi118gw==&#34;,&#xA;          &#34;name&#34;: &#34;dejavu-sans-fonts&#34;,&#xA;          &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dejavu-fonts&#34;,&#xA;            &#34;version&#34;: &#34;2.37-18.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;,&#xA;          &#34;name&#34;: &#34;pcre&#34;,&#xA;          &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre&#34;,&#xA;            &#34;version&#34;: &#34;8.44-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: {&#xA;          &#34;id&#34;: &#34;I16VSEydeiRYB1TSf5694A==&#34;,&#xA;          &#34;name&#34;: &#34;libreport-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libreport&#34;,&#xA;            &#34;version&#34;: &#34;2.15.2-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: {&#xA;          &#34;id&#34;: &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;,&#xA;          &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;          &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nghttp2&#34;,&#xA;            &#34;version&#34;: &#34;1.43.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-font-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: {&#xA;          &#34;id&#34;: &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;,&#xA;          &#34;name&#34;: &#34;json-glib&#34;,&#xA;          &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-glib&#34;,&#xA;            &#34;version&#34;: &#34;1.6.6-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: {&#xA;          &#34;id&#34;: &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;,&#xA;          &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;          &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;252-51.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: {&#xA;          &#34;id&#34;: &#34;Lwqn0aweLQLZmo12VvYcog==&#34;,&#xA;          &#34;name&#34;: &#34;popt&#34;,&#xA;          &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;popt&#34;,&#xA;            &#34;version&#34;: &#34;1.18-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: {&#xA;          &#34;id&#34;: &#34;M9YTWinowLqOqX/+8mbhjg==&#34;,&#xA;          &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;          &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;3.34.1-8.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: {&#xA;          &#34;id&#34;: &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;,&#xA;          &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;          &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;            &#34;version&#34;: &#34;4.4.18-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: {&#xA;          &#34;id&#34;: &#34;NdCY2/S+syamLH224R4hug==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: {&#xA;          &#34;id&#34;: &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;,&#xA;          &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;          &#34;version&#34;: &#34;2:4.9-12.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;4.9-12.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: {&#xA;          &#34;id&#34;: &#34;OCIjbR16ktOEiFK36r0WNw==&#34;,&#xA;          &#34;name&#34;: &#34;libtasn1&#34;,&#xA;          &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;4.16.0-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: {&#xA;          &#34;id&#34;: &#34;OaFmq38HlbKLTTEM/qATzg==&#34;,&#xA;          &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: {&#xA;          &#34;id&#34;: &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;,&#xA;          &#34;name&#34;: &#34;npth&#34;,&#xA;          &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;npth&#34;,&#xA;            &#34;version&#34;: &#34;1.6-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;,&#xA;          &#34;name&#34;: &#34;bash&#34;,&#xA;          &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bash&#34;,&#xA;            &#34;version&#34;: &#34;5.1.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;,&#xA;          &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;          &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;1.10.0-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: {&#xA;          &#34;id&#34;: &#34;PIk2BBAWexCFofMi5q03RA==&#34;,&#xA;          &#34;name&#34;: &#34;pcre2&#34;,&#xA;          &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;10.40-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: {&#xA;          &#34;id&#34;: &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;,&#xA;          &#34;name&#34;: &#34;microdnf&#34;,&#xA;          &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;microdnf&#34;,&#xA;            &#34;version&#34;: &#34;3.9.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: {&#xA;          &#34;id&#34;: &#34;RXh3fimX8fGZeCt4chJEiA==&#34;,&#xA;          &#34;name&#34;: &#34;librhsm&#34;,&#xA;          &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librhsm&#34;,&#xA;            &#34;version&#34;: &#34;0.0.3-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: {&#xA;          &#34;id&#34;: &#34;S8p9UGak1oycptcpYp/1eg==&#34;,&#xA;          &#34;name&#34;: &#34;openldap&#34;,&#xA;          &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;2.6.8-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: {&#xA;          &#34;id&#34;: &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;,&#xA;          &#34;name&#34;: &#34;libblkid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: {&#xA;          &#34;id&#34;: &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;,&#xA;          &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;bzip2&#34;,&#xA;            &#34;version&#34;: &#34;1.0.8-10.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: {&#xA;          &#34;id&#34;: &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;,&#xA;          &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;          &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;            &#34;version&#34;: &#34;0.8.2-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: {&#xA;          &#34;id&#34;: &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;,&#xA;          &#34;name&#34;: &#34;gpgme&#34;,&#xA;          &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gpgme&#34;,&#xA;            &#34;version&#34;: &#34;1.15.1-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: {&#xA;          &#34;id&#34;: &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;,&#xA;          &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;          &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;            &#34;version&#34;: &#34;1.42-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: {&#xA;          &#34;id&#34;: &#34;VX9V+Y680L2xf2tBREdpCw==&#34;,&#xA;          &#34;name&#34;: &#34;gmp&#34;,&#xA;          &#34;version&#34;: &#34;1:6.2.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gmp&#34;,&#xA;            &#34;version&#34;: &#34;6.2.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: {&#xA;          &#34;id&#34;: &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;,&#xA;          &#34;name&#34;: &#34;libxml2&#34;,&#xA;          &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;2.9.13-12.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XG5+bW8np2NedSy/od6z8Q==&#34;,&#xA;          &#34;name&#34;: &#34;libacl&#34;,&#xA;          &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;acl&#34;,&#xA;            &#34;version&#34;: &#34;2.3.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: {&#xA;          &#34;id&#34;: &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: {&#xA;          &#34;id&#34;: &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;,&#xA;          &#34;name&#34;: &#34;libgcc&#34;,&#xA;          &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;11.5.0-5.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: {&#xA;          &#34;id&#34;: &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;,&#xA;          &#34;name&#34;: &#34;readline&#34;,&#xA;          &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;readline&#34;,&#xA;            &#34;version&#34;: &#34;8.1-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: {&#xA;          &#34;id&#34;: &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-fips-provider-so&#34;,&#xA;          &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;3.0.7-6.el9_5&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: {&#xA;          &#34;id&#34;: &#34;arLt5War9yeQ8auYn/Idmw==&#34;,&#xA;          &#34;name&#34;: &#34;nettle&#34;,&#xA;          &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;nettle&#34;,&#xA;            &#34;version&#34;: &#34;3.10.1-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: {&#xA;          &#34;id&#34;: &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;,&#xA;          &#34;name&#34;: &#34;glib2&#34;,&#xA;          &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;2.68.4-16.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: {&#xA;          &#34;id&#34;: &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;,&#xA;          &#34;name&#34;: &#34;grep&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;grep&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: {&#xA;          &#34;id&#34;: &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;,&#xA;          &#34;name&#34;: &#34;libffi&#34;,&#xA;          &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libffi&#34;,&#xA;            &#34;version&#34;: &#34;3.4.2-8.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: {&#xA;          &#34;id&#34;: &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;,&#xA;          &#34;name&#34;: &#34;libsepol&#34;,&#xA;          &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsepol&#34;,&#xA;            &#34;version&#34;: &#34;3.6-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: {&#xA;          &#34;id&#34;: &#34;dC9CoYt17eaqinGSVCfCxw==&#34;,&#xA;          &#34;name&#34;: &#34;libattr&#34;,&#xA;          &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;attr&#34;,&#xA;            &#34;version&#34;: &#34;2.5.1-3.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: {&#xA;          &#34;id&#34;: &#34;de44cUqF23LvU0fOSvNRjA==&#34;,&#xA;          &#34;name&#34;: &#34;libevent&#34;,&#xA;          &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libevent&#34;,&#xA;            &#34;version&#34;: &#34;2.1.12-8.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: {&#xA;          &#34;id&#34;: &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;,&#xA;          &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;          &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;            &#34;version&#34;: &#34;2.13-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: {&#xA;          &#34;id&#34;: &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;,&#xA;          &#34;name&#34;: &#34;glibc-common&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: {&#xA;          &#34;id&#34;: &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;,&#xA;          &#34;name&#34;: &#34;lua-libs&#34;,&#xA;          &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lua&#34;,&#xA;            &#34;version&#34;: &#34;5.4.4-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: {&#xA;          &#34;id&#34;: &#34;eaygsCP+5IpdIryvw94Tcw==&#34;,&#xA;          &#34;name&#34;: &#34;rootfiles&#34;,&#xA;          &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rootfiles&#34;,&#xA;            &#34;version&#34;: &#34;8.1-34.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: {&#xA;          &#34;id&#34;: &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;,&#xA;          &#34;name&#34;: &#34;libusbx&#34;,&#xA;          &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libusbx&#34;,&#xA;            &#34;version&#34;: &#34;1.0.26-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: {&#xA;          &#34;id&#34;: &#34;gsKPriszRNKAqMnHK+dXgw==&#34;,&#xA;          &#34;name&#34;: &#34;libksba&#34;,&#xA;          &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libksba&#34;,&#xA;            &#34;version&#34;: &#34;1.5.1-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: {&#xA;          &#34;id&#34;: &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;,&#xA;          &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;lz4&#34;,&#xA;            &#34;version&#34;: &#34;1.9.3-5.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: {&#xA;          &#34;id&#34;: &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;,&#xA;          &#34;name&#34;: &#34;librepo&#34;,&#xA;          &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;librepo&#34;,&#xA;            &#34;version&#34;: &#34;1.14.5-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: {&#xA;          &#34;id&#34;: &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;,&#xA;          &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;          &#34;version&#34;: &#34;1:3.2.2-6.el9_5.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;3.2.2-6.el9_5.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: {&#xA;          &#34;id&#34;: &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;,&#xA;          &#34;name&#34;: &#34;dnf-data&#34;,&#xA;          &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;dnf&#34;,&#xA;            &#34;version&#34;: &#34;4.14.0-25.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: {&#xA;          &#34;id&#34;: &#34;izPQpATHYfezyT+kcua/tQ==&#34;,&#xA;          &#34;name&#34;: &#34;gnutls&#34;,&#xA;          &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;3.8.3-6.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: {&#xA;          &#34;id&#34;: &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;,&#xA;          &#34;name&#34;: &#34;alternatives&#34;,&#xA;          &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;chkconfig&#34;,&#xA;            &#34;version&#34;: &#34;1.24-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;,&#xA;          &#34;name&#34;: &#34;libcap&#34;,&#xA;          &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;2.48-9.el9_2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;,&#xA;          &#34;name&#34;: &#34;setup&#34;,&#xA;          &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;setup&#34;,&#xA;            &#34;version&#34;: &#34;2.13.7-10.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: {&#xA;          &#34;id&#34;: &#34;kgbITSeRtKiT7enG8buGXw==&#34;,&#xA;          &#34;name&#34;: &#34;libcom_err&#34;,&#xA;          &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;            &#34;version&#34;: &#34;1.46.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;,&#xA;          &#34;name&#34;: &#34;basesystem&#34;,&#xA;          &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;basesystem&#34;,&#xA;            &#34;version&#34;: &#34;11-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: {&#xA;          &#34;id&#34;: &#34;kp6BaioAZ30jbVeZkkzokA==&#34;,&#xA;          &#34;name&#34;: &#34;libzstd&#34;,&#xA;          &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zstd&#34;,&#xA;            &#34;version&#34;: &#34;1.5.5-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: {&#xA;          &#34;id&#34;: &#34;kvpHJLhsWpgEBJjx168pDg==&#34;,&#xA;          &#34;name&#34;: &#34;tzdata&#34;,&#xA;          &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;tzdata&#34;,&#xA;            &#34;version&#34;: &#34;2025b-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: {&#xA;          &#34;id&#34;: &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;,&#xA;          &#34;name&#34;: &#34;libdnf&#34;,&#xA;          &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libdnf&#34;,&#xA;            &#34;version&#34;: &#34;0.69.0-13.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: {&#xA;          &#34;id&#34;: &#34;lad8JH31WlI0MsNEYhUWlA==&#34;,&#xA;          &#34;name&#34;: &#34;glibc&#34;,&#xA;          &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;2.34-168.el9_6.23&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: {&#xA;          &#34;id&#34;: &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;,&#xA;          &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;          &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;7.76.1-31.el9_6.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: {&#xA;          &#34;id&#34;: &#34;mK/FUfODp3MR7WS2xegPsw==&#34;,&#xA;          &#34;name&#34;: &#34;langpacks-core-en&#34;,&#xA;          &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;langpacks&#34;,&#xA;            &#34;version&#34;: &#34;3.0-16.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: {&#xA;          &#34;id&#34;: &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;,&#xA;          &#34;name&#34;: &#34;libyaml&#34;,&#xA;          &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libyaml&#34;,&#xA;            &#34;version&#34;: &#34;0.2.5-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: {&#xA;          &#34;id&#34;: &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;,&#xA;          &#34;name&#34;: &#34;libuuid&#34;,&#xA;          &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;2.37.4-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: {&#xA;          &#34;id&#34;: &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;,&#xA;          &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;          &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;6.2-10.20210508.el9_6.2&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: {&#xA;          &#34;id&#34;: &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;,&#xA;          &#34;name&#34;: &#34;redhat-release&#34;,&#xA;          &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;redhat-release&#34;,&#xA;            &#34;version&#34;: &#34;9.6-0.1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: {&#xA;          &#34;id&#34;: &#34;qYSZ6aKFWol313IOGRXaug==&#34;,&#xA;          &#34;name&#34;: &#34;json-c&#34;,&#xA;          &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;json-c&#34;,&#xA;            &#34;version&#34;: &#34;0.14-11.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: {&#xA;          &#34;id&#34;: &#34;rCLp3m64Catai9VuHvh3Lw==&#34;,&#xA;          &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;          &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;keyutils&#34;,&#xA;            &#34;version&#34;: &#34;1.6.3-1.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: {&#xA;          &#34;id&#34;: &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;,&#xA;          &#34;name&#34;: &#34;gawk&#34;,&#xA;          &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;5.1.0-6.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: {&#xA;          &#34;id&#34;: &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;,&#xA;          &#34;name&#34;: &#34;mpfr&#34;,&#xA;          &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;mpfr&#34;,&#xA;            &#34;version&#34;: &#34;4.1.0-7.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: {&#xA;          &#34;id&#34;: &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;,&#xA;          &#34;name&#34;: &#34;sed&#34;,&#xA;          &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sed&#34;,&#xA;            &#34;version&#34;: &#34;4.8-9.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: {&#xA;          &#34;id&#34;: &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;,&#xA;          &#34;name&#34;: &#34;libunistring&#34;,&#xA;          &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libunistring&#34;,&#xA;            &#34;version&#34;: &#34;0.9.10-15.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: {&#xA;          &#34;id&#34;: &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;,&#xA;          &#34;name&#34;: &#34;fonts-filesystem&#34;,&#xA;          &#34;version&#34;: &#34;1:2.0.5-7.el9.1&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;fonts-rpm-macros&#34;,&#xA;            &#34;version&#34;: &#34;2.0.5-7.el9.1&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: {&#xA;          &#34;id&#34;: &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;,&#xA;          &#34;name&#34;: &#34;gnupg2&#34;,&#xA;          &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;2.3.3-4.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: {&#xA;          &#34;id&#34;: &#34;wCA3gMNtInqX1xg18QcnQg==&#34;,&#xA;          &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;          &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;            &#34;version&#34;: &#34;2024.2.69_v8.0.303-91.4.el9_4&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;noarch&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: {&#xA;          &#34;id&#34;: &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;,&#xA;          &#34;name&#34;: &#34;libarchive&#34;,&#xA;          &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;3.5.3-6.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: {&#xA;          &#34;id&#34;: &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;,&#xA;          &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;          &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;            &#34;version&#34;: &#34;2.13.0-2.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: {&#xA;          &#34;id&#34;: &#34;xSopjH0yPtbnx33MBmtmuA==&#34;,&#xA;          &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: {&#xA;          &#34;id&#34;: &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;,&#xA;          &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;          &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;            &#34;version&#34;: &#34;2.1.27-21.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: {&#xA;          &#34;id&#34;: &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;,&#xA;          &#34;name&#34;: &#34;libsemanage&#34;,&#xA;          &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsemanage&#34;,&#xA;            &#34;version&#34;: &#34;3.6-5.el9_6&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: {&#xA;          &#34;id&#34;: &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;,&#xA;          &#34;name&#34;: &#34;rpm&#34;,&#xA;          &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;          &#34;kind&#34;: &#34;binary&#34;,&#xA;          &#34;source&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;rpm&#34;,&#xA;            &#34;version&#34;: &#34;4.16.1.3-37.el9&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;arch&#34;: &#34;x86_64&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;distributions&#34;: {&#xA;        &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;: {&#xA;          &#34;id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;          &#34;did&#34;: &#34;rhel&#34;,&#xA;          &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;          &#34;version&#34;: &#34;9&#34;,&#xA;          &#34;version_code_name&#34;: &#34;&#34;,&#xA;          &#34;version_id&#34;: &#34;9&#34;,&#xA;          &#34;arch&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;          &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 9&#34;&#xA;        }&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;: {&#xA;          &#34;id&#34;: &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:9::appstream&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;        },&#xA;        &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;: {&#xA;          &#34;id&#34;: &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;,&#xA;          &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:9::baseos&#34;,&#xA;          &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;          &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;        }&#xA;      },&#xA;      &#34;environments&#34;: {&#xA;        &#34;+A7/nzEXX3Q/xJZ50VMnlQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+X1MdmtPTbyDb/wq7joJhA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/O7rOBo1qRMFm3q3Kf3mEw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/h/TBQhfoSMCmey5oN87jA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;0T19Aon0dgLleTpQjLWzKw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;1atoBfoH0mJ0bCpetQ7/0g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5+tHFkkNi+1rUDSrmgYdkw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;5fhQlRzIg/IB8EVM2pFIZA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7cpIREEQnkaI7dbmWgmrvg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;7vssDPaHKfFKMLimKBo7Gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;8uME+PFu6p/OAD7q+ZTVLw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;9olIUlLHZMdoUMju+8diyQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BQhiFmX4hLYteW4oRCLTSA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;BRLVvSCW1qZQlEQR2x48fQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;DrLq8qfU1bfE8o8AfdvkrQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;G61ZL2SOHR2qgvQfi118gw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;HQdWvmyUSqtI3UTY0T4JiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;I16VSEydeiRYB1TSf5694A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;JKP7JzVg7UGaAz4VrH03lQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KF5C+zKu/uFB7knCqOvDAQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Lwqn0aweLQLZmo12VvYcog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;MDH8Zt4oQWDiYk9qFV5Lbg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;NdCY2/S+syamLH224R4hug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;OgwdUybWl/HQYbnPTE4Psw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Ohssf0Jzlafd9vtrrUKCXg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;PZXvGa4khHd2n6o73hJ/Pg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;RXh3fimX8fGZeCt4chJEiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;Su8bfW9ijc0V5CiAum2V1g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;TPIRq84Pr3a6ywzPeCr3Pw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;To0NR+oyXDu1CYJfmVGurQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VV2Z1ngTs6sGvt5SrayPCg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;VX9V+Y680L2xf2tBREdpCw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XG5+bW8np2NedSy/od6z8Q==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;XwbkaIGCYyq6BjBMVZ1wzw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;arLt5War9yeQ8auYn/Idmw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bFvWffGqJWr7FWnI7K9NVw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bemGVBhbDe9iV1Kjvd9hAA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;bgzKs6bbeWeXxcqE+n7Jog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dC9CoYt17eaqinGSVCfCxw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;de44cUqF23LvU0fOSvNRjA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;dpQG/pUwAqVv1OdQqnvylQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eRa7MZyiHBvsv7GPhkGKdg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;eaygsCP+5IpdIryvw94Tcw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;f8lJd/yoDqE6O0RUQGqkpQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;gsKPriszRNKAqMnHK+dXgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;hYEisV19Dxn4PvCvxJFm5A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iTD/lpKAM3AZEWh+zVx2tg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;iaJm7Mdk9UadnBII0ZwMeA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;jAjaNW7NMGiv7HfByDu4RQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kFxhSjWy84mTZBM4XiZaeQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kgbITSeRtKiT7enG8buGXw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kigiD4fuysu8/DeCr+ONKQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kp6BaioAZ30jbVeZkkzokA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;kvpHJLhsWpgEBJjx168pDg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lI6hCbIwETVhCFhL4BxyiQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mK/FUfODp3MR7WS2xegPsw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;mPqGnMbiXN6jP61aGbHvOA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;pYM7mYzFYUjRrK74RyhfOw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;qYSZ6aKFWol313IOGRXaug==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rCLp3m64Catai9VuHvh3Lw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;rlHYqOr0lkUB/Gs6b1kD2g==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;ssPaV1VLDu6d5ZJ6Rrmh3A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;sx0C6L5COHIkv6yQQyPlbw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;u5TyEoU5GA6Z2czzwhMLiA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wCA3gMNtInqX1xg18QcnQg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;x4oijVhQU8BUwJwoFvk4QA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xSopjH0yPtbnx33MBmtmuA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;xhMgwxa+ubXlCA6s9XfRgw==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;yEp9fQVFIQAEDPCwC3GLmA==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ],&#xA;        &#34;zPvTALB8qlNtHa1j2iT5Zg==&#34;: [&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;a1752d98-cb05-46e0-851e-94da612c34c2&#34;,&#xA;            &#34;repository_ids&#34;: [&#xA;              &#34;70dd5db6-1003-4918-9d8a-ec0132a674d1&#34;,&#xA;              &#34;8b5329d2-a935-4bac-a139-24b7beeac3ed&#34;&#xA;            ]&#xA;          },&#xA;          {&#xA;            &#34;package_db&#34;: &#34;sqlite:var/lib/rpm&#34;,&#xA;            &#34;introduced_in&#34;: &#34;sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a&#34;,&#xA;            &#34;distribution_id&#34;: &#34;&#34;,&#xA;            &#34;repository_ids&#34;: null&#xA;          }&#xA;        ]&#xA;      },&#xA;      &#34;vulnerabilities&#34;: {&#xA;        &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;: {&#xA;          &#34;id&#34;: &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;: {&#xA;          &#34;id&#34;: &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;: {&#xA;          &#34;id&#34;: &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5450&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). This vulnerability occurs when an application uses the `scanf` family of functions with a `%mc` format specifier, which is used for dynamically allocating memory for character input, and provides an explicit width greater than 1024. This specific combination can lead to a one-byte heap buffer overflow, potentially allowing an attacker to corrupt memory.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:55:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5450 https://bugzilla.redhat.com/show_bug.cgi?id=2459853 https://www.cve.org/CVERecord?id=CVE-2026-5450 https://nvd.nist.gov/vuln/detail/CVE-2026-5450 https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5450.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;: {&#xA;          &#34;id&#34;: &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;: {&#xA;          &#34;id&#34;: &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;1/8/Mjb4nleg0SsOivHAww==&#34;: {&#xA;          &#34;id&#34;: &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;: {&#xA;          &#34;id&#34;: &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-14T21:01:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://www.cve.org/CVERecord?id=CVE-2026-0861 https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0861.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;: {&#xA;          &#34;id&#34;: &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;zlib&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;: {&#xA;          &#34;id&#34;: &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;          &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;: {&#xA;          &#34;id&#34;: &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;3bb0a18NQSPWO0aeq9twVw==&#34;: {&#xA;          &#34;id&#34;: &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;: {&#xA;          &#34;id&#34;: &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;: {&#xA;          &#34;id&#34;: &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69419 https://bugzilla.redhat.com/show_bug.cgi?id=2430386 https://www.cve.org/CVERecord?id=CVE-2025-69419 https://nvd.nist.gov/vuln/detail/CVE-2025-69419 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69419.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;59oEBlU3jh6EL6gtZDUaug==&#34;: {&#xA;          &#34;id&#34;: &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5BksN0izCeDRrtFMsNCyvg==&#34;: {&#xA;          &#34;id&#34;: &#34;5BksN0izCeDRrtFMsNCyvg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9232&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL HTTP client API no_proxy handling. This vulnerability allows an application level denial of service (application crash) via an attacker-controlled IPv6 URL when the no_proxy environment variable is set.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;5amguv6OT1njd8r+RXMCQQ==&#34;: {&#xA;          &#34;id&#34;: &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;: {&#xA;          &#34;id&#34;: &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;: {&#xA;          &#34;id&#34;: &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76mWuVYhbmIFsc4DNorK9A==&#34;: {&#xA;          &#34;id&#34;: &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;: {&#xA;          &#34;id&#34;: &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;78ARTcr/iVbEbtXWNEyadA==&#34;: {&#xA;          &#34;id&#34;: &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;: {&#xA;          &#34;id&#34;: &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40356&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit an integer underflow and an out-of-bounds read vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the process terminating, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40356 https://bugzilla.redhat.com/show_bug.cgi?id=2463368 https://www.cve.org/CVERecord?id=CVE-2026-40356 https://nvd.nist.gov/vuln/detail/CVE-2026-40356 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40356.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;: {&#xA;          &#34;id&#34;: &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;: {&#xA;          &#34;id&#34;: &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;: {&#xA;          &#34;id&#34;: &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;: {&#xA;          &#34;id&#34;: &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5928&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc (GNU C Library). When the `ungetwc` function is called on a file stream using wide characters with specific overlapping single-byte and multi-byte encodings, it may attempt to read data outside of its allocated buffer. This can lead to the unintentional disclosure of sensitive information from memory or cause the program to crash, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-20T20:37:31Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5928 https://bugzilla.redhat.com/show_bug.cgi?id=2459854 https://www.cve.org/CVERecord?id=CVE-2026-5928 https://nvd.nist.gov/vuln/detail/CVE-2026-5928 https://sourceware.org/bugzilla/show_bug.cgi?id=33998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5928.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;: {&#xA;          &#34;id&#34;: &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;: {&#xA;          &#34;id&#34;: &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;coreutils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;AUiFITCnRjRxctzqqbDeeA==&#34;: {&#xA;          &#34;id&#34;: &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Argl342WI7oZtgSo+p9kMA==&#34;: {&#xA;          &#34;id&#34;: &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;: {&#xA;          &#34;id&#34;: &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;: {&#xA;          &#34;id&#34;: &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;D7U85Qc3CYAscEzhSfT76A==&#34;: {&#xA;          &#34;id&#34;: &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15467&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T14:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15467 https://bugzilla.redhat.com/show_bug.cgi?id=2430376 https://www.cve.org/CVERecord?id=CVE-2025-15467 https://nvd.nist.gov/vuln/detail/CVE-2025-15467 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15467.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;: {&#xA;          &#34;id&#34;: &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;          &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gawk&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;: {&#xA;          &#34;id&#34;: &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;: {&#xA;          &#34;id&#34;: &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;: {&#xA;          &#34;id&#34;: &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;: {&#xA;          &#34;id&#34;: &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;: {&#xA;          &#34;id&#34;: &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;: {&#xA;          &#34;id&#34;: &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;: {&#xA;          &#34;id&#34;: &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GAn7gWUe2pFr7PbwechqxA==&#34;: {&#xA;          &#34;id&#34;: &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;: {&#xA;          &#34;id&#34;: &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;HxI42iSjURjRki+uV6q/9w==&#34;: {&#xA;          &#34;id&#34;: &#34;HxI42iSjURjRki+uV6q/9w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;          &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;: {&#xA;          &#34;id&#34;: &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;: {&#xA;          &#34;id&#34;: &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;: {&#xA;          &#34;id&#34;: &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system&#39;s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T22:08:41Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://www.cve.org/CVERecord?id=CVE-2026-0915 https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0915.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;: {&#xA;          &#34;id&#34;: &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-66199&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66199 https://bugzilla.redhat.com/show_bug.cgi?id=2430379 https://www.cve.org/CVERecord?id=CVE-2025-66199 https://nvd.nist.gov/vuln/detail/CVE-2025-66199 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66199.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;JqWXvYyB4T300h7KRcWtFA==&#34;: {&#xA;          &#34;id&#34;: &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13601&#34;,&#xA;          &#34;description&#34;: &#34;A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-24T13:00:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13601 https://bugzilla.redhat.com/show_bug.cgi?id=2416741 https://www.cve.org/CVERecord?id=CVE-2025-13601 https://nvd.nist.gov/vuln/detail/CVE-2025-13601 https://gitlab.gnome.org/GNOME/glib/-/issues/3827 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13601.json https://access.redhat.com/errata/RHSA-2026:0936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.68.4-18.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;: {&#xA;          &#34;id&#34;: &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;: {&#xA;          &#34;id&#34;: &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;: {&#xA;          &#34;id&#34;: &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;: {&#xA;          &#34;id&#34;: &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;L1pkWyFlg006sdV2pKTg4A==&#34;: {&#xA;          &#34;id&#34;: &#34;L1pkWyFlg006sdV2pKTg4A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;          &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-fips-provider&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LeWRqc+lggRL8KnG53e6CA==&#34;: {&#xA;          &#34;id&#34;: &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;: {&#xA;          &#34;id&#34;: &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;: {&#xA;          &#34;id&#34;: &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libtasn1&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;: {&#xA;          &#34;id&#34;: &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;: {&#xA;          &#34;id&#34;: &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;: {&#xA;          &#34;id&#34;: &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;: {&#xA;          &#34;id&#34;: &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;: {&#xA;          &#34;id&#34;: &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;: {&#xA;          &#34;id&#34;: &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-28T16:19:11Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68973 https://bugzilla.redhat.com/show_bug.cgi?id=2425966 https://www.cve.org/CVERecord?id=CVE-2025-68973 https://nvd.nist.gov/vuln/detail/CVE-2025-68973 https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306 https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9 https://gpg.fail/memcpy https://news.ycombinator.com/item?id=46403200 https://www.openwall.com/lists/oss-security/2025/12/28/5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68973.json https://access.redhat.com/errata/RHSA-2026:0719&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.3.3-5.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;PrCrIesi0sSvMQjPpvxecw==&#34;: {&#xA;          &#34;id&#34;: &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;: {&#xA;          &#34;id&#34;: &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;: {&#xA;          &#34;id&#34;: &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;QSP4YGVknCXnnhDrDAxftg==&#34;: {&#xA;          &#34;id&#34;: &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json https://access.redhat.com/errata/RHSA-2025:22660&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:252-55.el9_7.7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;: {&#xA;          &#34;id&#34;: &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;QskDoDnTSvrQeDXklM4YOw==&#34;: {&#xA;          &#34;id&#34;: &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;: {&#xA;          &#34;id&#34;: &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-6732&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-16T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6732 https://bugzilla.redhat.com/show_bug.cgi?id=2461300 https://www.cve.org/CVERecord?id=CVE-2026-6732 https://nvd.nist.gov/vuln/detail/CVE-2026-6732 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1097 https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6732.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;: {&#xA;          &#34;id&#34;: &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;pcre2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;: {&#xA;          &#34;id&#34;: &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;: {&#xA;          &#34;id&#34;: &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libmount&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;TwoNniaY2Urt7TF64epJXg==&#34;: {&#xA;          &#34;id&#34;: &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31790&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications that use RSASVE key encapsulation, a method for securely exchanging encryption keys, may inadvertently expose sensitive data. This vulnerability arises when an application processes a malicious, invalid RSA public key provided by an attacker without proper validation. Consequently, the application might send the contents of an uninitialized memory buffer, which could contain confidential information, to the attacker.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31790 https://bugzilla.redhat.com/show_bug.cgi?id=2451094 https://www.cve.org/CVERecord?id=CVE-2026-31790 https://nvd.nist.gov/vuln/detail/CVE-2026-31790 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31790.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;: {&#xA;          &#34;id&#34;: &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-30571&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.&#34;,&#xA;          &#34;issued&#34;: &#34;2023-05-29T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;: {&#xA;          &#34;id&#34;: &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;: {&#xA;          &#34;id&#34;: &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;: {&#xA;          &#34;id&#34;: &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;: {&#xA;          &#34;id&#34;: &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;WxO9le6q4ACTs4KnSuckDw==&#34;: {&#xA;          &#34;id&#34;: &#34;WxO9le6q4ACTs4KnSuckDw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json https://access.redhat.com/errata/RHSA-2025:20559&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;2:4.9-15.el9&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;: {&#xA;          &#34;id&#34;: &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gcc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;: {&#xA;          &#34;id&#34;: &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;: {&#xA;          &#34;id&#34;: &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;: {&#xA;          &#34;id&#34;: &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;YtNpM5pykErH+UBXZABWdg==&#34;: {&#xA;          &#34;id&#34;: &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;: {&#xA;          &#34;id&#34;: &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;: {&#xA;          &#34;id&#34;: &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;xz&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;: {&#xA;          &#34;id&#34;: &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;: {&#xA;          &#34;id&#34;: &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;: {&#xA;          &#34;id&#34;: &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;: {&#xA;          &#34;id&#34;: &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;d/522T+B/ARMNSG+3QfAWA==&#34;: {&#xA;          &#34;id&#34;: &#34;d/522T+B/ARMNSG+3QfAWA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openldap&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;: {&#xA;          &#34;id&#34;: &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-11187&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11187 https://bugzilla.redhat.com/show_bug.cgi?id=2430375 https://www.cve.org/CVERecord?id=CVE-2025-11187 https://nvd.nist.gov/vuln/detail/CVE-2025-11187 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11187.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;util-linux&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;e0VfCD1REapdkagkByCnXQ==&#34;: {&#xA;          &#34;id&#34;: &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;: {&#xA;          &#34;id&#34;: &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;f6oGdnhZomBa/bs3snB3kA==&#34;: {&#xA;          &#34;id&#34;: &#34;f6oGdnhZomBa/bs3snB3kA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-02-09T14:26:34Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14831 https://bugzilla.redhat.com/show_bug.cgi?id=2423177 https://www.cve.org/CVERecord?id=CVE-2025-14831 https://nvd.nist.gov/vuln/detail/CVE-2025-14831 https://gitlab.com/gnutls/gnutls/-/issues/1773 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14831.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;: {&#xA;          &#34;id&#34;: &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;: {&#xA;          &#34;id&#34;: &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;          &#34;description&#34;: &#34;A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-15T13:44:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6965 https://bugzilla.redhat.com/show_bug.cgi?id=2380149 https://www.cve.org/CVERecord?id=CVE-2025-6965 https://nvd.nist.gov/vuln/detail/CVE-2025-6965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6965.json https://access.redhat.com/errata/RHSA-2025:20936&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.34.1-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;: {&#xA;          &#34;id&#34;: &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-27135&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-18T17:59:02Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27135 https://bugzilla.redhat.com/show_bug.cgi?id=2448754 https://www.cve.org/CVERecord?id=CVE-2026-27135 https://nvd.nist.gov/vuln/detail/CVE-2026-27135 https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27135.json https://access.redhat.com/errata/RHSA-2026:7668&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:1.43.0-6.el9_7.1&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;: {&#xA;          &#34;id&#34;: &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnupg2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ija3h8P09PxwjEuLSUS2HA==&#34;: {&#xA;          &#34;id&#34;: &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ixD2h349uZz3eCy55KxIlw==&#34;: {&#xA;          &#34;id&#34;: &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;: {&#xA;          &#34;id&#34;: &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;          &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;: {&#xA;          &#34;id&#34;: &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;: {&#xA;          &#34;id&#34;: &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;klH60uFrR0WkawaSlcOEKg==&#34;: {&#xA;          &#34;id&#34;: &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;: {&#xA;          &#34;id&#34;: &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lQBARBTddFvexevUD04GZA==&#34;: {&#xA;          &#34;id&#34;: &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;: {&#xA;          &#34;id&#34;: &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-40355&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in MIT Kerberos 5 (krb5). An unauthenticated remote attacker can exploit a NULL pointer dereference vulnerability by calling `gss_accept_sec_context()` on a system with a NegoEx mechanism registered. This can lead to the termination of the process, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-40355 https://bugzilla.redhat.com/show_bug.cgi?id=2463370 https://www.cve.org/CVERecord?id=CVE-2026-40355 https://nvd.nist.gov/vuln/detail/CVE-2026-40355 https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f https://web.mit.edu/kerberos/advisories/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-40355.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;krb5&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;: {&#xA;          &#34;id&#34;: &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;mYgwcPpa/l0bTZdysqbplg==&#34;: {&#xA;          &#34;id&#34;: &#34;mYgwcPpa/l0bTZdysqbplg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json https://access.redhat.com/errata/RHSA-2025:22376&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.9.13-14.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;mZCCwO//htsOIXazj/SeOw==&#34;: {&#xA;          &#34;id&#34;: &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;: {&#xA;          &#34;id&#34;: &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;oqSc7q4k6wTno/u9knscCQ==&#34;: {&#xA;          &#34;id&#34;: &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2024-9681&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain&#39;s cache entry, making it end sooner or later than intended.&#34;,&#xA;          &#34;issued&#34;: &#34;2024-11-06T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;: {&#xA;          &#34;id&#34;: &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9086&#34;,&#xA;          &#34;description&#34;: &#34;An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-12T05:10:03Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json https://access.redhat.com/errata/RHSA-2026:1350&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libcurl-minimal&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:7.76.1-35.el9_7.3&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;: {&#xA;          &#34;id&#34;: &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-20T13:22:46Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15281 https://bugzilla.redhat.com/show_bug.cgi?id=2431196 https://www.cve.org/CVERecord?id=CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15281.json https://access.redhat.com/errata/RHSA-2026:2786&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.34-231.el9_7.10&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;smB1yCGhBb8gDhPAER7odg==&#34;: {&#xA;          &#34;id&#34;: &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;svCt47J2Zwa45xj8gn3U/w==&#34;: {&#xA;          &#34;id&#34;: &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;sykv+pGN4TXggZNIwL/H4g==&#34;: {&#xA;          &#34;id&#34;: &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;tbhLz74i3ShwS72WbIsoOA==&#34;: {&#xA;          &#34;id&#34;: &#34;tbhLz74i3ShwS72WbIsoOA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;          &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;ncurses&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u0cs09LPRVEEfen4PHM6gA==&#34;: {&#xA;          &#34;id&#34;: &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libxml2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;: {&#xA;          &#34;id&#34;: &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;: {&#xA;          &#34;id&#34;: &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-5435&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. Specifically, deprecated functions responsible for printing TSIG (Transaction Signature) records fail to properly manage memory buffers. This oversight can lead to an out-of-bounds write when processing specially crafted TSIG records. An attacker could exploit this to cause a denial of service or potentially execute arbitrary code.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-28T11:58:54Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5435 https://bugzilla.redhat.com/show_bug.cgi?id=2463465 https://www.cve.org/CVERecord?id=CVE-2026-5435 https://nvd.nist.gov/vuln/detail/CVE-2026-5435 https://inbox.sourceware.org/libc-announce/7a655d55-276f-41fe-b550-feb3ebb2ce91@redhat.com/T/#u https://sourceware.org/bugzilla/show_bug.cgi?id=34033 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5435.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glibc&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uaetuJImncB6wudykQLpEA==&#34;: {&#xA;          &#34;id&#34;: &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;: {&#xA;          &#34;id&#34;: &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libblkid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;vQmd/px1n2vUjUceHOjVLA==&#34;: {&#xA;          &#34;id&#34;: &#34;vQmd/px1n2vUjUceHOjVLA==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;systemd&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;: {&#xA;          &#34;id&#34;: &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8510&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-9.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;: {&#xA;          &#34;id&#34;: &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;          &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;: {&#xA;          &#34;id&#34;: &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-11-18T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9820 https://bugzilla.redhat.com/show_bug.cgi?id=2392528 https://www.cve.org/CVERecord?id=CVE-2025-9820 https://nvd.nist.gov/vuln/detail/CVE-2025-9820 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9820.json https://access.redhat.com/errata/RHSA-2026:4188&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;gnutls&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.8.3-10.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;y7I268PAr74OoToX85XE8w==&#34;: {&#xA;          &#34;id&#34;: &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json https://access.redhat.com/errata/RHSA-2026:1473&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;yUucg71orzE08FiDgaKBPQ==&#34;: {&#xA;          &#34;id&#34;: &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).&#34;,&#xA;          &#34;issued&#34;: &#34;2025-09-30T23:59:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json https://access.redhat.com/errata/RHSA-2025:21255&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;1:3.5.1-4.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;ymKqobod4xPivmLT/iq9oQ==&#34;: {&#xA;          &#34;id&#34;: &#34;ymKqobod4xPivmLT/iq9oQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-41990&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in Libgcrypt. During Dilithium signing operations, the library fails to perform a bounds check when writing to a static array. While the data involved is not directly controlled by an attacker, this vulnerability could lead to memory corruption, potentially resulting in a denial of service (DoS) or affecting data integrity.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-04-23T04:39:04Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41990 https://bugzilla.redhat.com/show_bug.cgi?id=2461068 https://www.cve.org/CVERecord?id=CVE-2026-41990 https://nvd.nist.gov/vuln/detail/CVE-2026-41990 https://dev.gnupg.org/T8208 https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html https://www.openwall.com/lists/oss-security/2026/04/21/1 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41990.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;: {&#xA;          &#34;id&#34;: &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;glib2&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;: {&#xA;          &#34;id&#34;: &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;          &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://www.cve.org/CVERecord?id=CVE-2025-14104 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14104.json https://access.redhat.com/errata/RHSA-2026:1913&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libuuid&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:2.37.4-21.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;: {&#xA;          &#34;id&#34;: &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2026-4111&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-03-11T00:00:00Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4111 https://bugzilla.redhat.com/show_bug.cgi?id=2446453 https://www.cve.org/CVERecord?id=CVE-2026-4111 https://nvd.nist.gov/vuln/detail/CVE-2026-4111 https://github.com/libarchive/libarchive/pull/2877 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4111.json https://access.redhat.com/errata/RHSA-2026:5080&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;libarchive&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;binary&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;0:3.5.3-7.el9_7&#34;,&#xA;          &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;        },&#xA;        &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;: {&#xA;          &#34;id&#34;: &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;          &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;          &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;          &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;          &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;          &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;          &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;          &#34;package&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;curl&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;kind&#34;: &#34;source&#34;,&#xA;            &#34;normalized_version&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;distribution&#34;: {&#xA;            &#34;id&#34;: &#34;&#34;,&#xA;            &#34;did&#34;: &#34;&#34;,&#xA;            &#34;name&#34;: &#34;&#34;,&#xA;            &#34;version&#34;: &#34;&#34;,&#xA;            &#34;version_code_name&#34;: &#34;&#34;,&#xA;            &#34;version_id&#34;: &#34;&#34;,&#xA;            &#34;arch&#34;: &#34;&#34;,&#xA;            &#34;cpe&#34;: &#34;&#34;,&#xA;            &#34;pretty_name&#34;: &#34;&#34;&#xA;          },&#xA;          &#34;repository&#34;: {&#xA;            &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;,&#xA;            &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;            &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*&#34;&#xA;          },&#xA;          &#34;fixed_in_version&#34;: &#34;&#34;&#xA;        }&#xA;      },&#xA;      &#34;package_vulnerabilities&#34;: {&#xA;        &#34;+bwl6UbMaWOBWdHNekJsEw==&#34;: [&#xA;          &#34;AD3UsMwxeXvBzVWIm5l5yw==&#34;&#xA;        ],&#xA;        &#34;/L1kFEoHZTukrNTCQLypFQ==&#34;: [&#xA;          &#34;aOUfuyvyyWEe7Z1IZT+fGw==&#34;&#xA;        ],&#xA;        &#34;/ub7EE8Da46T0x7lRdlVJg==&#34;: [&#xA;          &#34;z/beWyrkyrQJfgGCkMIsWg==&#34;,&#xA;          &#34;T+jfDhqJcXwVQ38oWEz/6g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;2gCbp4kt+cF44NF/LqukDg==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;6WyRl8U3PR6ipKlxqlBzFA==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;7mDaaxs3ev+uNEDYC97U3Q==&#34;: [&#xA;          &#34;1npmxgSnoYj2MyAhQMaE7g==&#34;&#xA;        ],&#xA;        &#34;7ra56f21gLrcSpBD8a9+NQ==&#34;: [&#xA;          &#34;BheYJlsY7UG2Ru8eF1IU4g==&#34;,&#xA;          &#34;TccjTp2Y8sTyWrjrm24IKA==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;CpfomSYboaXPZ9yn9NgGgw==&#34;: [&#xA;          &#34;7aI+wyLEqkIPj2Wh4f1UKg==&#34;,&#xA;          &#34;lppk3oI+Rm/KVCEYBGVKcg==&#34;&#xA;        ],&#xA;        &#34;FZ9gWulzkx76xjTSH/yM/g==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;FrUQI+koTfbikRk1jsFd0w==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;IZ65O3ZOapykHwhaOX1/YA==&#34;: [&#xA;          &#34;hHDtCxiuvJ9VSCSwnEG0Fw==&#34;&#xA;        ],&#xA;        &#34;KXUGN6voGlWUMRN5TCFy4w==&#34;: [&#xA;          &#34;QSP4YGVknCXnnhDrDAxftg==&#34;,&#xA;          &#34;DrIVK8+yvV91OzF2CS9o5A==&#34;,&#xA;          &#34;QskDoDnTSvrQeDXklM4YOw==&#34;,&#xA;          &#34;vQmd/px1n2vUjUceHOjVLA==&#34;&#xA;        ],&#xA;        &#34;M9YTWinowLqOqX/+8mbhjg==&#34;: [&#xA;          &#34;LeWRqc+lggRL8KnG53e6CA==&#34;,&#xA;          &#34;g6ZHihkpvpkr3oZoVOs05w==&#34;,&#xA;          &#34;bugTfOdgCaATW4vTnuXTSQ==&#34;,&#xA;          &#34;HxI42iSjURjRki+uV6q/9w==&#34;&#xA;        ],&#xA;        &#34;O1acB+rpl9OLkk9I6phF7Q==&#34;: [&#xA;          &#34;WxO9le6q4ACTs4KnSuckDw==&#34;&#xA;        ],&#xA;        &#34;OCIjbR16ktOEiFK36r0WNw==&#34;: [&#xA;          &#34;LuirMfnv2JkWFEU8MUuKUQ==&#34;&#xA;        ],&#xA;        &#34;OaFmq38HlbKLTTEM/qATzg==&#34;: [&#xA;          &#34;rz/CPeG1fPitayrSa0BFxQ==&#34;,&#xA;          &#34;l1pK1ezh6e0g8I+Dp2iK7w==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;P5Om9zCJ/QZ+hnrEvj6fGw==&#34;: [&#xA;          &#34;ymKqobod4xPivmLT/iq9oQ==&#34;&#xA;        ],&#xA;        &#34;PIk2BBAWexCFofMi5q03RA==&#34;: [&#xA;          &#34;S5Dzz9cigoJDCj8s5UcT0g==&#34;&#xA;        ],&#xA;        &#34;S8p9UGak1oycptcpYp/1eg==&#34;: [&#xA;          &#34;d/522T+B/ARMNSG+3QfAWA==&#34;&#xA;        ],&#xA;        &#34;SjQtW3gQmgt+Qj8JlnY4Mg==&#34;: [&#xA;          &#34;bgJs7DKkcMwNTsh9yTDgQg==&#34;,&#xA;          &#34;uu3d3lIlYVCZwOjqoNec3g==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;WtG8AvirpmNJ8wVE+fxfGQ==&#34;: [&#xA;          &#34;FLpBF1y0CvCfFuXOmlaRZw==&#34;,&#xA;          &#34;AwYRRq6SmgfJLn2NZxQUdw==&#34;,&#xA;          &#34;qFIYjZJeFnLAVC7lR0n6oQ==&#34;,&#xA;          &#34;RHShqbO2hqcBNPYbKDg/3A==&#34;,&#xA;          &#34;8kndQj/aRn+NNJdGVP9v4g==&#34;,&#xA;          &#34;DTApvRZh1HJD5XbbpU3ahw==&#34;,&#xA;          &#34;jiVVTQmOtKqVixv7agF/Hg==&#34;,&#xA;          &#34;u0cs09LPRVEEfen4PHM6gA==&#34;,&#xA;          &#34;F4WBuBnk4OQIl1a5Q4CVPg==&#34;,&#xA;          &#34;8ZCpE1M7eqNdy615aO2gLQ==&#34;,&#xA;          &#34;mYgwcPpa/l0bTZdysqbplg==&#34;&#xA;        ],&#xA;        &#34;XJlS+gwEt7T+nNr/Bflqzg==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;XMkvB1ljVS0bNTUu2UEs3g==&#34;: [&#xA;          &#34;XPUXyp+BOEJyEGOgXafi8Q==&#34;&#xA;        ],&#xA;        &#34;ZabCZVOpeuHGnRiGdzqBig==&#34;: [&#xA;          &#34;L1pkWyFlg006sdV2pKTg4A==&#34;&#xA;        ],&#xA;        &#34;ayTA+mXRKgSCRl5LaqP4/w==&#34;: [&#xA;          &#34;JqWXvYyB4T300h7KRcWtFA==&#34;,&#xA;          &#34;klH60uFrR0WkawaSlcOEKg==&#34;,&#xA;          &#34;VYGbkY0i6P3tRJd9mM1wNg==&#34;,&#xA;          &#34;PrCrIesi0sSvMQjPpvxecw==&#34;,&#xA;          &#34;Qbjoqw6Ot3cGOKNyQYBo4g==&#34;,&#xA;          &#34;e0VfCD1REapdkagkByCnXQ==&#34;,&#xA;          &#34;svCt47J2Zwa45xj8gn3U/w==&#34;,&#xA;          &#34;ixc06f0H9vqMfsbwQSwwvA==&#34;,&#xA;          &#34;yzZzF1vLZmeTiLJMgY7W0Q==&#34;,&#xA;          &#34;NrTzMmbWyM5UeSvnQVNLOg==&#34;,&#xA;          &#34;Eh3WlvVSpgyvj1kaA5So7g==&#34;&#xA;        ],&#xA;        &#34;eK3V3oi6vbIfOQRAcWBYDw==&#34;: [&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;&#xA;        ],&#xA;        &#34;iVtx1BX52G3zRfk+g/oWIg==&#34;: [&#xA;          &#34;78ARTcr/iVbEbtXWNEyadA==&#34;,&#xA;          &#34;7eKrcl3YwGJqhWmZNbH7Eg==&#34;,&#xA;          &#34;KCgZ2MK707GRfjAO2Q3SOA==&#34;,&#xA;          &#34;Q6o565VsHFcmyuOW6jCOGw==&#34;,&#xA;          &#34;fFM0zIKtKuexRqlZMkzQpg==&#34;,&#xA;          &#34;3bb0a18NQSPWO0aeq9twVw==&#34;,&#xA;          &#34;WP0Zjo/ORuC7+jbSIrru8A==&#34;,&#xA;          &#34;Argl342WI7oZtgSo+p9kMA==&#34;,&#xA;          &#34;ncqqUTuMttuUZ8SF9/Ywrg==&#34;,&#xA;          &#34;u90uEyQ6vxfKeIQvjGNTHQ==&#34;,&#xA;          &#34;429KD7e1Cl6AyUZNBGOTQw==&#34;,&#xA;          &#34;OB9n4NdBrq+3wlcM9+90Dg==&#34;,&#xA;          &#34;JK4fCJz1Ja5lmfE/vF5PcQ==&#34;,&#xA;          &#34;D7U85Qc3CYAscEzhSfT76A==&#34;,&#xA;          &#34;e/EuZlSZUQTHCSl8kHuFag==&#34;,&#xA;          &#34;+U7CyAHaY71mhNm2Xnq2uw==&#34;,&#xA;          &#34;y7I268PAr74OoToX85XE8w==&#34;,&#xA;          &#34;bjyLMZdYnkrpUxDySiQ34Q==&#34;,&#xA;          &#34;4u3exWl+MPcCOYOgbQLM+A==&#34;,&#xA;          &#34;ixD2h349uZz3eCy55KxIlw==&#34;,&#xA;          &#34;j/vFtwZCr4ow5q2VPKgR9g==&#34;,&#xA;          &#34;/jvSCV2RwJ6c/Llx9z8uvA==&#34;,&#xA;          &#34;Jrkns8qeStFRPhcitcuZ4w==&#34;,&#xA;          &#34;yUucg71orzE08FiDgaKBPQ==&#34;,&#xA;          &#34;GWKQvGJTKzyU9GiQECoFhg==&#34;,&#xA;          &#34;5amguv6OT1njd8r+RXMCQQ==&#34;,&#xA;          &#34;2TDjlt2gAEWsLyBBPigFYw==&#34;,&#xA;          &#34;WVv0x6iWhzRgZZTPZ190Ng==&#34;,&#xA;          &#34;M293c+QguJ/aaYP3cMwfyQ==&#34;,&#xA;          &#34;Ie7rkr8oApZOM9PK2gFB6A==&#34;,&#xA;          &#34;0E1VjQWdmolR9lr9ElIZZQ==&#34;,&#xA;          &#34;6hAQW3vY9ZA/8datv1rY4g==&#34;,&#xA;          &#34;TwoNniaY2Urt7TF64epJXg==&#34;,&#xA;          &#34;mZCCwO//htsOIXazj/SeOw==&#34;,&#xA;          &#34;YtNpM5pykErH+UBXZABWdg==&#34;,&#xA;          &#34;5BksN0izCeDRrtFMsNCyvg==&#34;&#xA;        ],&#xA;        &#34;izPQpATHYfezyT+kcua/tQ==&#34;: [&#xA;          &#34;1/8/Mjb4nleg0SsOivHAww==&#34;,&#xA;          &#34;XdzUGUJMTsfPfs79OXKU4Q==&#34;,&#xA;          &#34;y/3qWQj3xOUQpm2CUr+ftg==&#34;,&#xA;          &#34;f6oGdnhZomBa/bs3snB3kA==&#34;&#xA;        ],&#xA;        &#34;kAEPeyZOK/FwFoG6mOFUbQ==&#34;: [&#xA;          &#34;VzbOWZs6Sa8zFH+GQEnasQ==&#34;&#xA;        ],&#xA;        &#34;lad8JH31WlI0MsNEYhUWlA==&#34;: [&#xA;          &#34;Iy2V+5RC7ENxxmnS9KdBOw==&#34;,&#xA;          &#34;SYSyRuW2vXdWcXLSfRP1aQ==&#34;,&#xA;          &#34;1hhG+RKT0fsxlS/Wf/LWEA==&#34;,&#xA;          &#34;uWz4SaM79VpO4EPAy+0C8g==&#34;,&#xA;          &#34;/A7M1zrsMND1dKjg2gEuyg==&#34;,&#xA;          &#34;ija3h8P09PxwjEuLSUS2HA==&#34;,&#xA;          &#34;59oEBlU3jh6EL6gtZDUaug==&#34;,&#xA;          &#34;9bjl4H6CMWLL3h1g5y6i9Q==&#34;,&#xA;          &#34;MT27FBW6q+x91HBvTyGVKQ==&#34;,&#xA;          &#34;IrRjtVOpf04EO7iAKFAznQ==&#34;,&#xA;          &#34;sJNoOKrtqJYf9M2tWcTlqg==&#34;,&#xA;          &#34;+UOyQgpOAnrWS+mVMK5k1Q==&#34;&#xA;        ],&#xA;        &#34;mDM1q1sl0PqUWEn54kTSRw==&#34;: [&#xA;          &#34;N7otM4CJgwQwy0Mz0UA3Vw==&#34;,&#xA;          &#34;Lhc4n2a9ma6eRDB/RCRmLQ==&#34;,&#xA;          &#34;6rEIsdyQtCC456AuGwgsDQ==&#34;,&#xA;          &#34;8MfvwX+dRI6Qt2H+x71rZg==&#34;,&#xA;          &#34;oqSc7q4k6wTno/u9knscCQ==&#34;,&#xA;          &#34;zqGJegkbTlVqcHBa6HtRTQ==&#34;,&#xA;          &#34;Pza9Y2xtH9MChVMkZwgw2A==&#34;,&#xA;          &#34;smB1yCGhBb8gDhPAER7odg==&#34;,&#xA;          &#34;l6IrI73Pg+lrisEtcgX+0Q==&#34;,&#xA;          &#34;YIlv6HIDfGqvZL/MDTWWpg==&#34;,&#xA;          &#34;FQwXyPZ+oHyxQZ9RBQXbpw==&#34;,&#xA;          &#34;X7DmUVoCri5i6vdYVBBgXg==&#34;,&#xA;          &#34;a9FllBAJiFi5FeYl0KG4aQ==&#34;,&#xA;          &#34;3UNcgW64Eji4iyY2ZDB1cg==&#34;&#xA;        ],&#xA;        &#34;nzQEyt4JfkGeZIIHPiBhog==&#34;: [&#xA;          &#34;zmNQpHydwXFAJmLcFFYiyQ==&#34;,&#xA;          &#34;bOC69k4Gpn8Av1w/ra2Tdw==&#34;,&#xA;          &#34;e0/Fzu8wfMZp9zX32i9rMQ==&#34;&#xA;        ],&#xA;        &#34;nzlusFbkan5h1d1Ks+BKBQ==&#34;: [&#xA;          &#34;tbhLz74i3ShwS72WbIsoOA==&#34;&#xA;        ],&#xA;        &#34;rY/kE/V4JnxYoqV+lmc9mg==&#34;: [&#xA;          &#34;DDxCHnX+kCqcRQj9b90/cg==&#34;&#xA;        ],&#xA;        &#34;v3i4ez5juML2ZWwR+6dFFg==&#34;: [&#xA;          &#34;PUCpgzV2LGcCb5yPJbawGw==&#34;,&#xA;          &#34;AUiFITCnRjRxctzqqbDeeA==&#34;,&#xA;          &#34;9iigvnuYDaC8UzcOIDLjIQ==&#34;,&#xA;          &#34;iF/o4aDbQf1DAw7R+LiVQw==&#34;,&#xA;          &#34;GAn7gWUe2pFr7PbwechqxA==&#34;,&#xA;          &#34;76z9Mpn8Jp7lhZSPsHTHug==&#34;&#xA;        ],&#xA;        &#34;wfJGCqOH8d+IYg/dAepx1A==&#34;: [&#xA;          &#34;vtpIIEEoAREfzDi0+K26Fg==&#34;,&#xA;          &#34;eUh0vSDVmqXTnsB7jL0b4g==&#34;,&#xA;          &#34;znnZtQrOfSxqGV/OZKzI5g==&#34;,&#xA;          &#34;uaetuJImncB6wudykQLpEA==&#34;,&#xA;          &#34;VWEbeFnFOHy1IkG21b5a5g==&#34;,&#xA;          &#34;xxrOMZzPk7ETmnvrIjBo0A==&#34;,&#xA;          &#34;mJw+LvAbCoVMIOZXCXNFpg==&#34;,&#xA;          &#34;76mWuVYhbmIFsc4DNorK9A==&#34;,&#xA;          &#34;lQBARBTddFvexevUD04GZA==&#34;,&#xA;          &#34;sykv+pGN4TXggZNIwL/H4g==&#34;,&#xA;          &#34;Kqq2xlybjD/tOLmQWu2xPw==&#34;,&#xA;          &#34;Ez8lHT2uV9Tf9vJC/T4WXg==&#34;,&#xA;          &#34;YX2rGofSXHBcNhTOGpNkAA==&#34;,&#xA;          &#34;LxYgcRll4fEnbCHHZWt4BA==&#34;,&#xA;          &#34;KMGV9rbVZ/vVUNSX6f+JqA==&#34;&#xA;        ]&#xA;      },&#xA;      &#34;enrichments&#34;: {}&#xA;    }&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-oci-attach-report: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry&#xA;    Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#xA;    Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 4,&#xA;    &#x9;&#x9;&#34;warnings&#34;: [&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libnghttp2-1.43.0-6.el9 (CVE-2026-27135), libarchive-3.5.3-6.el9_6 (CVE-2026-4111, CVE-2026-4424), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15467), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965), gnupg2-2.3.3-4.el9 (CVE-2025-68973)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 6&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcap-2.48-9.el9_2 (CVE-2026-4878), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40356)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 2&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libmount-2.37.4-21.el9 (CVE-2025-14104), libuuid-2.37.4-21.el9 (CVE-2025-14104), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libblkid-2.37.4-21.el9 (CVE-2025-14104), glib2-2.68.4-16.el9_6.2 (CVE-2025-13601), libarchive-3.5.3-6.el9_6 (CVE-2026-5121), libsmartcols-2.37.4-21.el9 (CVE-2025-14104), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-11187, CVE-2025-69419, CVE-2025-9230), gnutls-3.8.3-6.el9_6.2 (CVE-2025-14831), glibc-2.34-168.el9_6.23 (CVE-2026-0915), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 15&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9 (CVE-2026-27456), libuuid-2.37.4-21.el9 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), systemd-libs-252-51.el9_6.2 (CVE-2026-29111, CVE-2026-4105), libblkid-2.37.4-21.el9 (CVE-2026-27456), glib2-2.68.4-16.el9_6.2 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), libsmartcols-2.37.4-21.el9 (CVE-2026-27456), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libxml2-2.9.13-12.el9_6 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2026-28386, CVE-2026-28390, CVE-2026-31790), openldap-2.6.8-4.el9 (CVE-2026-22185), gnupg2-2.3.3-4.el9 (CVE-2025-68972), glibc-common-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-2.34-168.el9_6.23 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), krb5-libs-1.21.1-8.el9_6 (CVE-2026-40355), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 52&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796), gnutls-3.8.3-6.el9_6.2 (CVE-2025-9820), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), glibc-2.34-168.el9_6.23 (CVE-2025-15281, CVE-2026-0861)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 13&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;{&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), glibc-minimal-langpack-2.34-168.el9_6.23 (CVE-2026-4438), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libtasn1-4.16.0-9.el9 (CVE-2025-13151), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), pcre2-10.40-6.el9 (CVE-2022-41409), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), openssl-fips-provider-so-3.0.7-6.el9_5 (CVE-2026-2673), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232, CVE-2025-70873), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), glibc-common-2.34-168.el9_6.23 (CVE-2026-4438), glibc-2.34-168.el9_6.23 (CVE-2026-4438), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), openssl-fips-provider-3.0.7-6.el9_5 (CVE-2026-2673), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224)&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;    &#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 55&#xA;    &#x9;&#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;&#x9;}&#xA;    &#x9;&#x9;]&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:6,&#34;medium&#34;:15,&#34;low&#34;:13,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:2,&#34;medium&#34;:52,&#34;low&#34;:55,&#34;unknown&#34;:0}}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f&#34;, &#34;digests&#34;: [&#34;sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589&#34;]}}&#xA;    {&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-29T11:36:02+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | init container: prepare&#xA;    2026/04/29 11:20:29 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-2b46z-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:21:27Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | init container: prepare&#xA;    2026/04/29 11:44:56 Entrypoint initialization&#xA;    &#xA;    pod: gh-multi-component-parent-qdry-on-push-45lcb-init-pod | container step-init: &#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-04-29T11:45:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | init container: prepare\n2026/04/29 11:06:16 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-pull-request-5cvdz-init-pod | container step-init: \ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-04-29T11:06:19Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | init container: prepare\n2026/04/29 11:33:39 Entrypoint initialization\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry:6dfc0e7818e3cee33bb9a249454b22fc82dd0f9f\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] digest: sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589\&#34;\ntime=\&#34;2026-04-29T11:34:21Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-04-29T11:34:22Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: prepare\n2026/04/29 11:32:59 Entrypoint initialization\n\n pod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | init container: place-scripts\n2026/04/29 11:33:14 Decoded script /tekton/scripts/script-0-8pcw5\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-1-k99l2\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-2-ghmvw\n2026/04/29 11:33:15 Decoded script /tekton/scripts/script-3-jvvln\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-image-manifests: \nInspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-sctz/gh-multi-component-parent-qdry@sha256:07b50c6276ab547fcfa1b838f5cfaf2daff016ca6df40c6ca4670fdabad20589.\n\npod: gh-multi-component-parent-qdry-on-push-2b46z-clair-scan-pod | container step-get-vulnerabilities: \nRunning clair-action on amd64 image manifest...\n\x1b[90m2026-04-29T11:34:39Z\x1b[0m \x1b[32mINF\x1b[0m \x1b[1mmatchers created\x1b[0m \x1b[36mcomponent=\x1b[0mlibvuln/New \x1b[36mmatchers=\x1b[0m[{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/debian\&#34;,\&#34;name\&#34;:\&#34;debian-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc\&#34;,\&#34;name\&#34;:\&#34;rhel-container-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/suse\&#34;,\&#34;name\&#34;:\&#34;suse\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu\&#34;,\&#34;name\&#34;:\&#34;ubuntu-matcher\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/oracle\&#34;,\&#34;name\&#34;:\&#34;oracle\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/photon\&#34;,\&#34;name\&#34;:\&#34;photon\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/python\&#34;,\&#34;name\&#34;:\&#34;python\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/claircore/rhel\&#34;,\&#34;name\&#34;:\&#34;rhel\&#34;},{\&#34;docs\&#34;:\&#34;https://pkg.go.dev/github.com/quay/clai...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:403 @ 04/29/26 11:46:48.363&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 11:46:48.363 (34m32.71s)&#xA;&gt; Enter [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 11:46:48.363&#xA;&lt; Exit [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 11:46:54.578 (6.215s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:46:54.579&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:46:55.346 (767ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:412 @ 04/29/26 11:46:55.36&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:429 @ 04/29/26 11:46:55.361&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:440 @ 04/29/26 11:46:55.361&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="80.242305566">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:33.474&#xA;&lt; Exit [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:44.801 (11.327s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:01:44.802&#xA;Image repository for component fj-test-custom-default-urqyjk in namespace build-e2e-ejpt do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-test-custom-default-urqyjk in namespace build-e2e-ejpt do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-test-custom-default-urqyjk in namespace build-e2e-ejpt do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:02:14.942 (30.141s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:02:14.943&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:02:53.716 (38.773s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:53.716&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:53.716 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.131774717">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:02:53.717&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:02:53.849 (131ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:53.849&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:53.849 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="20.203013073">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:02:53.85&#xA;PipelineRun has not been created yet for the component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:03:14.052 (20.203s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.052&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.052 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.000314538">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:03:14.053&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:03:14.053 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.053&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.053 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.066269223">
              <system-err>&gt; Enter [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:03:14.054&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://codeberg.org/konflux-qe/devfile-sample-hello-world-lajgmn/pulls/1&#34;,&#34;configuration-time&#34;:&#34;Wed, 29 Apr 2026 11:02:51 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://codeberg.org/konflux-qe/devfile-sample-hello-world-lajgmn/pulls/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 29 Apr 2026 11:02:51 UTC&#xA;&lt; Exit [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:03:14.12 (66ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.12&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.12 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.33893736">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:03:14.121&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:03:15.459 (1.338s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.46&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.46 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.288245282">
              <system-err>&gt; Enter [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:03:15.46&#xA;&lt; Exit [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:03:15.748 (288ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.748&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.748 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="114.822847665">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:03:15.749&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:05:10.571 (1m54.822s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:10.571&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:10.572 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.335356888">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:05:10.572&#xA;&lt; Exit [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:05:11.907 (1.335s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:11.908&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:11.908 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.155552678">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:05:11.909&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:05:13.064 (1.155s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:13.064&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:05:13.064 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="50.984291541">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:05:13.065&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:05:23.325 (10.26s)&#xA;&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:05:23.325&#xA;PipelineRun has not been created yet for the component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:06:04.049 (40.724s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:04.049&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:04.049 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.327590751">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:06:04.05&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:06:04.377 (327ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:04.377&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:04.377 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="500.45867963">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:06:04.378&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh found for Component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:14:24.836 (8m20.458s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:24.836&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:24.836 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="2.072254156">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:14:24.838&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:14:26.909 (2.072s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:26.91&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:26.91 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.283156171">
              <system-err>&gt; Enter [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:14:26.91&#xA;&lt; Exit [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:14:27.193 (283ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:27.193&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:27.193 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.820627225">
              <system-err>&gt; Enter [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:14:27.194&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-ejpt/fj-test-custom-branch-eztadk:on-pr-1428ef1526bb4446a3598c6f4a9c3b35fe8d8b07 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:14:28.014 (820ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:28.014&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:28.014 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="1.840182682">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:14:28.015&#xA;&lt; Exit [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:14:29.855 (1.84s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:29.855&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:29.855 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.511134209">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:14:29.856&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:14:29.856 (0s)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:14:29.856&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:14:30.367 (510ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:30.367&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:14:30.367 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="62.724189852">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:14:30.368&#xA;created file sha: ed7cd7a127eb63503601d199e529ec42af18fdb7&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:14:31.354 (985ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:14:31.354&#xA;PipelineRun has not been created yet for the component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:15:33.092 (1m1.738s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:15:33.092&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:15:33.092 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.261717839">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:15:33.093&#xA;&lt; Exit [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:15:33.354 (261ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:15:33.354&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:15:33.354 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="failed" time="3359.410125243">
              <failure message="Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:494 @ 04/29/26 12:11:32.039&#xA;</failure>
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 11:15:33.355&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn found for Component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-cdkkn reason: Failed&#xA;attempt 1/3: PipelineRun &#34;fj-test-custom-branch-eztadk-on-pull-request-cdkkn&#34; failed: &#xA; pod: fj-test-custom-branch-eztadk-on-pull-request-2fwzh-init-pod | init container: prepare&#xA;2026/04/29 11:07:16 Entrypoint initialization&#xA;&#xA;pod: fj-test-custom-branch-eztadk-on-pull-request-2fwzh-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: fj-test-custom-branch-eztadk-on-pull-request-cdkkn-init-pod | init container: prepare&#xA;2026/04/29 11:27:15 Entrypoint initialization&#xA;&#xA;pod: fj-test-custom-branch-eztadk-on-pull-request-cdkkn-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh found after retrigger for component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr found for Component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: &#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-c2xcr reason: Failed&#xA;attempt 2/3: PipelineRun &#34;fj-test-custom-branch-eztadk-on-pull-request-c2xcr&#34; failed: &#xA; pod: fj-test-custom-branch-eztadk-on-pull-request-2fwzh-init-pod | init container: prepare&#xA;2026/04/29 11:07:16 Entrypoint initialization&#xA;&#xA;pod: fj-test-custom-branch-eztadk-on-pull-request-2fwzh-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:07:23Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: fj-test-custom-branch-eztadk-on-pull-request-c2xcr-init-pod | init container: prepare&#xA;2026/04/29 11:39:30 Entrypoint initialization&#xA;&#xA;pod: fj-test-custom-branch-eztadk-on-pull-request-c2xcr-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:39:36Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: fj-test-custom-branch-eztadk-on-pull-request-cdkkn-init-pod | init container: prepare&#xA;2026/04/29 11:27:15 Entrypoint initialization&#xA;&#xA;pod: fj-test-custom-branch-eztadk-on-pull-request-cdkkn-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:27:24Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:27:25Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-test-custom-branch-eztadk-on-pull-request-2fwzh found after retrigger for component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj found for Component build-e2e-ejpt/fj-test-custom-branch-eztadk&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: ResolvingTaskRef&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: Running&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;PipelineRun fj-test-custom-branch-eztadk-on-pull-request-vf8wj reason: PipelineRunStopping&#xA;attempt 3/3: PipelineRun &#34;fj-test-custom-branch-eztadk-on-pull-request-vf8wj&#34; failed: context deadline exceeded&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:494 @ 04/29/26 12:11:32.039&#xA;&lt; Exit [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 12:11:32.039 (55m58.683s)&#xA;&gt; Enter [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 12:11:32.039&#xA;&lt; Exit [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 12:11:32.039 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 12:11:32.039&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 12:11:32.765 (726ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:497 @ 04/29/26 12:11:32.766&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:523 @ 04/29/26 12:11:32.766&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:539 @ 04/29/26 12:11:32.767&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:545 @ 04/29/26 12:11:32.767&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:560 @ 04/29/26 12:11:32.767&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:590 @ 04/29/26 12:11:32.768&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:701 @ 04/29/26 12:11:32.768&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="70.12472688">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:01:33.572&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gl-multi-component-parent-jbmm&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /workspace/source/test/e2e/renovate.go:72 @ 04/29/26 11:02:02.276 (28.704s)&#xA;&gt; Enter [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:02:02.276&#xA;Image repository for component gl-multi-component-child-jbmm in namespace build-e2e-yrhs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-child-jbmm in namespace build-e2e-yrhs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-child-jbmm in namespace build-e2e-yrhs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-parent-jbmm in namespace build-e2e-yrhs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /workspace/source/test/e2e/renovate.go:235 @ 04/29/26 11:02:43.696 (41.42s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:43.696&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:02:43.696 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="345.995988881">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:02:43.697&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:259 @ 04/29/26 11:08:29.693 (5m45.996s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:08:29.693&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:08:29.693 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="802.909775387">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:08:29.694&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj found for Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-pull-request-g86gj reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/test/e2e/renovate.go:274 @ 04/29/26 11:21:52.603 (13m22.909s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:52.603&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:52.603 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="1.9328390770000001">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:21:52.604&#xA;PipelineRun gl-multi-component-child-jbmm-on-pull-request-2nhv9 found for Component build-e2e-yrhs/gl-multi-component-child-jbmm&#xA;PipelineRun gl-multi-component-child-jbmm-on-pull-request-2nhv9 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/test/e2e/renovate.go:285 @ 04/29/26 11:21:54.536 (1.932s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:54.537&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:54.537 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="0.29959899">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:21:54.537&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /workspace/source/test/e2e/renovate.go:289 @ 04/29/26 11:21:54.836 (299ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:54.837&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:54.837 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="1.320183399">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:21:54.837&#xA;merged result sha: 9351ef72424b0862ddded9299649eff472acc869 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /workspace/source/test/e2e/renovate.go:307 @ 04/29/26 11:21:56.157 (1.32s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:56.157&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:21:56.157 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="69.074556418">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:21:56.158&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/test/e2e/renovate.go:318 @ 04/29/26 11:23:05.232 (1m9.074s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:05.232&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:05.232 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="0.222320091">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:23:05.233&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /workspace/source/test/e2e/renovate.go:358 @ 04/29/26 11:23:05.455 (222ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:05.455&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:05.455 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="1.225651711">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:23:05.456&#xA;merged result sha: 6ba416cd4ab05fe09b5965575d10efd4a80e2000 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /workspace/source/test/e2e/renovate.go:375 @ 04/29/26 11:23:06.681 (1.225s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:06.681&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:06.681 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="passed" time="20.359338048">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:23:06.682&#xA;Push PipelineRun has not been created yet for the component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/test/e2e/renovate.go:385 @ 04/29/26 11:23:27.041 (20.359s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:27.041&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 11:23:27.041 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="failed" time="3053.305074791">
              <failure message="Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:403 @ 04/29/26 12:14:13.48&#xA;</failure>
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 11:23:27.042&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq found for Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun has not been created yet for the Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-gk9rq reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-parent-jbmm-on-push-gk9rq&#34; failed: &#xA; pod: gl-multi-component-parent-jbmm-on-pull-request-g86gj-init-pod | init container: prepare&#xA;2026/04/29 11:09:51 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-jbmm-on-pull-request-g86gj-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gl-multi-component-parent-jbmm-on-push-gk9rq-init-pod | init container: prepare&#xA;2026/04/29 11:30:29 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-jbmm-on-push-gk9rq-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 found after retrigger for component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 found for Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-w9cp4 reason: Failed&#xA;attempt 2/3: PipelineRun &#34;gl-multi-component-parent-jbmm-on-push-w9cp4&#34; failed: &#xA; pod: gl-multi-component-parent-jbmm-on-pull-request-g86gj-init-pod | init container: prepare&#xA;2026/04/29 11:09:51 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-jbmm-on-pull-request-g86gj-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:10:01Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gl-multi-component-parent-jbmm-on-push-gk9rq-init-pod | init container: prepare&#xA;2026/04/29 11:30:29 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-jbmm-on-push-gk9rq-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:30:40Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gl-multi-component-parent-jbmm-on-push-w9cp4-init-pod | init container: prepare&#xA;2026/04/29 11:42:02 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-jbmm-on-push-w9cp4-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:42:04Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg found after retrigger for component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg found for Component build-e2e-yrhs/gl-multi-component-parent-jbmm&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: Running&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-jbmm-on-push-2ztlg reason: PipelineRunStopping&#xA;attempt 3/3: PipelineRun &#34;gl-multi-component-parent-jbmm-on-push-2ztlg&#34; failed: context deadline exceeded&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:403 @ 04/29/26 12:14:13.48&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /workspace/source/test/e2e/renovate.go:401 @ 04/29/26 12:14:13.48 (50m46.438s)&#xA;&gt; Enter [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 12:14:13.48&#xA;&lt; Exit [AfterAll] component update with renovate - /workspace/source/test/e2e/renovate.go:214 @ 04/29/26 12:14:19.675 (6.195s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 12:14:19.675&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/renovate.go:28 @ 04/29/26 12:14:20.347 (672ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:412 @ 04/29/26 12:14:20.348&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:429 @ 04/29/26 12:14:20.348&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/renovate.go:440 @ 04/29/26 12:14:20.348&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="23.808401491">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /workspace/source/test/e2e/multi_component.go:40 @ 04/29/26 11:01:33.573&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /workspace/source/test/e2e/multi_component.go:40 @ 04/29/26 11:01:37.234 (3.661s)&#xA;&gt; Enter [It] creates component with context directory go-component - /workspace/source/test/e2e/multi_component.go:106 @ 04/29/26 11:01:37.234&#xA;Image repository for component go-component-eoxmrr in namespace build-e2e-xlaq do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-eoxmrr in namespace build-e2e-xlaq do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory go-component - /workspace/source/test/e2e/multi_component.go:106 @ 04/29/26 11:01:57.38 (20.146s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:01:57.381&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:01:57.381 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-eoxmrr [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="40.288272456">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:125 @ 04/29/26 11:01:57.382&#xA;PipelineRun has not been created yet for the component build-e2e-xlaq/go-component-eoxmrr&#xA;PipelineRun has not been created yet for the component build-e2e-xlaq/go-component-eoxmrr&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:125 @ 04/29/26 11:02:37.67 (40.288s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:02:37.67&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:02:37.67 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-eoxmrr [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="0.433700688">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:140 @ 04/29/26 11:02:37.671&#xA;&lt; Exit [It] should lead to a PaC PR creation for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:140 @ 04/29/26 11:02:38.105 (433ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:02:38.105&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:02:38.105 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-eoxmrr [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="500.213525728">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:159 @ 04/29/26 11:02:38.106&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g found for Component build-e2e-xlaq/go-component-eoxmrr&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Running&#xA;PipelineRun go-component-eoxmrr-on-pull-request-64k7g reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component go-component-eoxmrr - /workspace/source/test/e2e/multi_component.go:159 @ 04/29/26 11:10:58.319 (8m20.213s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:10:58.319&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:10:58.319 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="2.179818959">
              <system-err>&gt; Enter [It] merging the PR should be successful - /workspace/source/test/e2e/multi_component.go:164 @ 04/29/26 11:10:58.321&#xA;merged result sha: e65d4ea2e4fcfa354897cce9bcd8957aa28a1bbc for PR #32714&#xA;&lt; Exit [It] merging the PR should be successful - /workspace/source/test/e2e/multi_component.go:164 @ 04/29/26 11:11:00.5 (2.179s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:00.5&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:00.5 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="21.173022603">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /workspace/source/test/e2e/multi_component.go:174 @ 04/29/26 11:11:00.501&#xA;Push PipelineRun has not been created yet for the component build-e2e-xlaq/go-component-eoxmrr&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /workspace/source/test/e2e/multi_component.go:174 @ 04/29/26 11:11:21.674 (21.173s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:21.674&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:21.674 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="10.467934639">
              <system-err>&gt; Enter [It] creates component with context directory python-component - /workspace/source/test/e2e/multi_component.go:106 @ 04/29/26 11:11:21.675&#xA;&lt; Exit [It] creates component with context directory python-component - /workspace/source/test/e2e/multi_component.go:106 @ 04/29/26 11:11:32.142 (10.467s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:32.142&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:32.142 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-ayhvev [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="20.210118205">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:125 @ 04/29/26 11:11:32.143&#xA;PipelineRun has not been created yet for the component build-e2e-xlaq/python-component-ayhvev&#xA;&lt; Exit [It] triggers a PipelineRun for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:125 @ 04/29/26 11:11:52.353 (20.21s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:52.353&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:52.353 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-ayhvev [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="0.442310104">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:140 @ 04/29/26 11:11:52.354&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:140 @ 04/29/26 11:11:52.796 (442ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:52.796&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 11:11:52.796 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-ayhvev [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="failed" time="4310.138910112">
              <failure message="Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:161 @ 04/29/26 12:23:40.763&#xA;</failure>
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:159 @ 04/29/26 11:11:52.798&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn found for Component build-e2e-xlaq/python-component-ayhvev&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-dp8xn reason: Failed&#xA;attempt 1/3: PipelineRun &#34;python-component-ayhvev-on-pull-request-dp8xn&#34; failed: &#xA; pod: python-component-ayhvev-on-0204027c1bb82451011ee8bbb8c896d6-pod | init container: prepare&#xA;2026/04/29 11:15:36 Entrypoint initialization&#xA;&#xA; pod: python-component-ayhvev-on-0204027c1bb82451011ee8bbb8c896d6-pod | init container: place-scripts&#xA;2026/04/29 11:16:55 Decoded script /tekton/scripts/script-0-44nhq&#xA;2026/04/29 11:16:55 Decoded script /tekton/scripts/script-1-csfzl&#xA;&#xA;pod: python-component-ayhvev-on-0204027c1bb82451011ee8bbb8c896d6-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777461591.266629,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777461591.7287467,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 4d4f2cbfd35ad27a352ef6ad616ed72e3991bb8d (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777461591.7287927,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1777461591.7476695,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 4d4f2cbfd35ad27a352ef6ad616ed72e3991bb8d directly.&#xA;&#xA;pod: python-component-ayhvev-on-0204027c1bb82451011ee8bbb8c896d6-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: python-component-ayhvev-on-0204027c1bb82451011ee8bbb8c896d6-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:901dc06d1b8faf592bebd941f6c3c19ac2afeccfe73094946ebc2db5371616d6)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-xlaq/python-component-ayhvev&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.cwIAgV/auth-ik7QvO.json quay.io/redhat-appstudio-qe/build-e2e-xlaq/python-component-ayhvev:on-pr-4d4f2cbfd35ad27a352ef6ad616ed72e3991bb8d.git SOURCE_ARTIFACT&#xA;Uploading 901dc06d1b8f SOURCE_ARTIFACT&#xA;Uploaded  901dc06d1b8f SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-xlaq/python-component-ayhvev:on-pr-4d4f2cbfd35ad27a352ef6ad616ed72e3991bb8d.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:f8a7b3cb02b499913aab4b88734b79ca3995999adc2305ecbe01fd701220587f&#xA;Artifacts created&#xA;&#xA;&#xA; pod: python-component-ayhvev-on-pull-request-dp8xn-init-pod | init container: prepare&#xA;2026/04/29 11:13:06 Entrypoint initialization&#xA;&#xA;pod: python-component-ayhvev-on-pull-request-dp8xn-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:13:11Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun python-component-ayhvev-on-pull-request-gg6tg found after retrigger for component build-e2e-xlaq/python-component-ayhvev&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg found for Component build-e2e-xlaq/python-component-ayhvev&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: &#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-gg6tg reason: PipelineRunStopping&#xA;attempt 2/3: PipelineRun &#34;python-component-ayhvev-on-pull-request-gg6tg&#34; failed: context deadline exceededNew PipelineRun python-component-ayhvev-on-pull-request-bq4tx found after retrigger for component build-e2e-xlaq/python-component-ayhvev&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx found for Component build-e2e-xlaq/python-component-ayhvev&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: ResolvingTaskRef&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: Running&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;PipelineRun python-component-ayhvev-on-pull-request-bq4tx reason: PipelineRunStopping&#xA;attempt 3/3: PipelineRun &#34;python-component-ayhvev-on-pull-request-bq4tx&#34; failed: context deadline exceeded&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:161 @ 04/29/26 12:23:40.763&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component python-component-ayhvev - /workspace/source/test/e2e/multi_component.go:159 @ 04/29/26 12:23:40.763 (1h11m47.965s)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /workspace/source/test/e2e/multi_component.go:68 @ 04/29/26 12:23:40.763&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /workspace/source/test/e2e/multi_component.go:68 @ 04/29/26 12:23:42.174 (1.411s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 12:23:42.174&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/multi_component.go:28 @ 04/29/26 12:23:42.936 (762ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:164 @ 04/29/26 12:23:42.937&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:174 @ 04/29/26 12:23:42.937&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:190 @ 04/29/26 12:23:42.938&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:205 @ 04/29/26 12:23:42.938&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/test/e2e/multi_component.go:264 @ 04/29/26 12:23:42.938&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="57.880373486">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:33.568&#xA;&lt; Exit [BeforeAll] PaC component build - /workspace/source/test/e2e/pac_build.go:56 @ 04/29/26 11:01:40.298 (6.729s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:01:40.298&#xA;Image repository for component gh-test-custom-default-swklvq in namespace build-e2e-kxss do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-test-custom-default-swklvq in namespace build-e2e-kxss do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/test/e2e/pac_build.go:118 @ 04/29/26 11:02:00.427 (20.129s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:02:00.427&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/test/e2e/pac_build.go:137 @ 04/29/26 11:02:31.448 (31.021s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:31.448&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:31.448 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.301398193">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:02:31.449&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/test/e2e/pac_build.go:154 @ 04/29/26 11:02:31.75 (301ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:31.75&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:31.75 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.521699387">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:02:31.751&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:176 @ 04/29/26 11:02:32.272 (521ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.272&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.272 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.00039629">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:02:32.273&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /workspace/source/test/e2e/pac_build.go:191 @ 04/29/26 11:02:32.273 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.273&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.273 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.511941615">
              <system-err>&gt; Enter [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:02:32.274&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-jyihgx/pull/1&#34;,&#34;configuration-time&#34;:&#34;Wed, 29 Apr 2026 11:02:27 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-jyihgx/pull/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Wed, 29 Apr 2026 11:02:27 UTC&#xA;&lt; Exit [It] component build status is set correctly - /workspace/source/test/e2e/pac_build.go:195 @ 04/29/26 11:02:32.785 (512ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.785&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:32.785 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.362698316">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:02:32.786&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:225 @ 04/29/26 11:02:34.148 (1.362s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:34.148&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:34.149 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.282801298">
              <system-err>&gt; Enter [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:02:34.149&#xA;&lt; Exit [It] created image repo is private - /workspace/source/test/e2e/pac_build.go:243 @ 04/29/26 11:02:34.432 (282ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:34.432&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:02:34.432 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="40.118362893">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:02:34.433&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:249 @ 04/29/26 11:03:14.551 (40.118s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.551&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.551 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.214450973">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:03:14.552&#xA;&lt; Exit [It] PR branch should not exist in the repo - /workspace/source/test/e2e/pac_build.go:264 @ 04/29/26 11:03:14.766 (214ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.766&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:14.766 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.888798924">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:03:14.767&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/test/e2e/pac_build.go:277 @ 04/29/26 11:03:15.656 (888ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.656&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:03:15.656 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="189.756103894">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:03:15.657&#xA;Image repository for component gh-test-custom-branch-xnefyl in namespace build-e2e-kxss do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:303 @ 04/29/26 11:03:25.783 (10.126s)&#xA;&gt; Enter [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:03:25.783&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/test/e2e/pac_build.go:327 @ 04/29/26 11:06:25.412 (2m59.629s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:25.413&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:25.413 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.264627473">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:06:25.413&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /workspace/source/test/e2e/pac_build.go:342 @ 04/29/26 11:06:25.677 (264ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:25.678&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:06:25.678 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="921.715988067">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:06:25.679&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d found for Component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun has not been created yet for the Component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-sbs8d reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /workspace/source/test/e2e/pac_build.go:360 @ 04/29/26 11:21:47.395 (15m21.716s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:47.395&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:47.395 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="1.681755447">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:21:47.396&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/test/e2e/pac_build.go:365 @ 04/29/26 11:21:49.077 (1.681s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:49.077&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:49.078 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.318152548">
              <system-err>&gt; Enter [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:21:49.078&#xA;&lt; Exit [It] created image repo is public - /workspace/source/test/e2e/pac_build.go:384 @ 04/29/26 11:21:49.396 (318ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:49.396&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:49.396 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="3.523686609">
              <system-err>&gt; Enter [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:21:49.397&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-kxss/gh-test-custom-branch-xnefyl:on-pr-e9d17eb452cc506f2a474857ec89968cc12e2af7 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /workspace/source/test/e2e/pac_build.go:390 @ 04/29/26 11:21:52.92 (3.523s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:52.92&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:52.92 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="2.065383862">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:21:52.921&#xA;&lt; Exit [It] should ensure pruning labels are set - /workspace/source/test/e2e/pac_build.go:416 @ 04/29/26 11:21:54.986 (2.065s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:54.986&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:54.986 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.524922657">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:21:54.987&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/test/e2e/pac_build.go:433 @ 04/29/26 11:21:55.451 (464ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:21:55.451&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /workspace/source/test/e2e/pac_build.go:320 @ 04/29/26 11:21:55.512 (60ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:55.512&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:21:55.512 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="66.529420142">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:21:55.513&#xA;created file sha: 390d176b6b063ae29a495650f521d24212f2332f&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /workspace/source/test/e2e/pac_build.go:448 @ 04/29/26 11:21:56.269 (756ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:21:56.269&#xA;PipelineRun has not been created yet for the component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /workspace/source/test/e2e/pac_build.go:458 @ 04/29/26 11:23:02.042 (1m5.773s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:23:02.042&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:23:02.042 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.258004712">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:23:02.043&#xA;&lt; Exit [It] should lead to a PaC init PR update - /workspace/source/test/e2e/pac_build.go:473 @ 04/29/26 11:23:02.301 (257ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:23:02.301&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 11:23:02.301 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="timedout" time="3853.539136629">
              <failure message="A suite timeout occurred" type="timedout">[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 12:27:15.165&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish (Spec Runtime: 1h4m12.863s)&#xA;    /workspace/source/test/e2e/pac_build.go:492&#xA;    In [It] (Node Runtime: 1h4m12.863s)&#xA;      /workspace/source/test/e2e/pac_build.go:492&#xA;&#xA;    Spec Goroutine&#xA;    goroutine 545 [select]&#xA;      k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x54fbcd8, 0xc0007e5ab0}, {0x54e8c50, 0xc000932580}, 0x1, 0x0, 0xc000f49d18)&#xA;        /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:66&#xA;      k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x54fbb88?, 0x76d9900?}, 0x4a817c800, 0x45d964b800?, 0x1, 0xc000071d18)&#xA;        /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48&#xA;      github.com/konflux-ci/e2e-tests/pkg/clients/has.(*HasController).WaitForComponentPipelineToBeFinished(0xc001246140, 0xc001324f08, {0x0, 0x0}, {0xc0014cfe00, 0x28}, {0x0, 0x0}, 0xc0009d25c0, 0xc000f49e70, ...)&#xA;        /opt/app-root/src/go/pkg/mod/github.com/konflux-ci/e2e-tests@v0.0.0-20260428105747-f0b222ad8cb6/pkg/clients/has/components.go:218&#xA;    &gt; github.com/konflux-ci/build-service/test/e2e.init.func3.1.1.5.4()&#xA;        /workspace/source/test/e2e/pac_build.go:493&#xA;          | })&#xA;          | It(&#34;PipelineRun should eventually finish&#34;, func() {&#xA;          &gt; &#x9;Expect(f.AsKubeAdmin.HasController.WaitForComponentPipelineToBeFinished(component, &#34;&#34;, createdFileSHA, &#34;&#34;,&#xA;          | &#x9;&#x9;f.AsKubeAdmin.TektonController, &amp;has.RetryOptions{Retries: 2, Always: true}, plr)).To(Succeed())&#xA;          | &#x9;createdFileSHA = plr.Labels[&#34;pipelinesascode.tekton.dev/sha&#34;]&#xA;      github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x4df713e?, 0xc000ca2338?})&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/node.go:585&#xA;      github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:946&#xA;      github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 110&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:911&#xA;</failure>
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 11:23:02.302&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw found for Component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-8h6rw reason: PipelineRunStopping&#xA;attempt 1/3: PipelineRun &#34;gh-test-custom-branch-xnefyl-on-pull-request-8h6rw&#34; failed: context deadline exceededNew PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm found after retrigger for component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm found for Component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: PipelineRunStopping&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-m29hm reason: Failed&#xA;attempt 2/3: PipelineRun &#34;gh-test-custom-branch-xnefyl-on-pull-request-m29hm&#34; failed: &#xA; pod: gh-test-custom-branch-xnefyl-on-pull-request-m29hm-init-pod | init container: prepare&#xA;2026/04/29 11:53:18 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-xnefyl-on-pull-request-m29hm-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:53:20Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-test-custom-branch-xnefyl-on-pull-request-sbs8d-init-pod | init container: prepare&#xA;2026/04/29 11:08:11 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-xnefyl-on-pull-request-sbs8d-init-pod | container step-init: &#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-29T11:08:20Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 found after retrigger for component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 found for Component build-e2e-kxss/gh-test-custom-branch-xnefyl&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;PipelineRun gh-test-custom-branch-xnefyl-on-pull-request-ccww2 reason: Running&#xA;[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 12:27:15.165&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish (Spec Runtime: 1h4m12.863s)&#xA;    /workspace/source/test/e2e/pac_build.go:492&#xA;    In [It] (Node Runtime: 1h4m12.863s)&#xA;      /workspace/source/test/e2e/pac_build.go:492&#xA;&#xA;    Spec Goroutine&#xA;    goroutine 545 [select]&#xA;      k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x54fbcd8, 0xc0007e5ab0}, {0x54e8c50, 0xc000932580}, 0x1, 0x0, 0xc000f49d18)&#xA;        /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:66&#xA;      k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x54fbb88?, 0x76d9900?}, 0x4a817c800, 0x45d964b800?, 0x1, 0xc000071d18)&#xA;        /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48&#xA;      github.com/konflux-ci/e2e-tests/pkg/clients/has.(*HasController).WaitForComponentPipelineToBeFinished(0xc001246140, 0xc001324f08, {0x0, 0x0}, {0xc0014cfe00, 0x28}, {0x0, 0x0}, 0xc0009d25c0, 0xc000f49e70, ...)&#xA;        /opt/app-root/src/go/pkg/mod/github.com/konflux-ci/e2e-tests@v0.0.0-20260428105747-f0b222ad8cb6/pkg/clients/has/components.go:218&#xA;    &gt; github.com/konflux-ci/build-service/test/e2e.init.func3.1.1.5.4()&#xA;        /workspace/source/test/e2e/pac_build.go:493&#xA;          | })&#xA;          | It(&#34;PipelineRun should eventually finish&#34;, func() {&#xA;          &gt; &#x9;Expect(f.AsKubeAdmin.HasController.WaitForComponentPipelineToBeFinished(component, &#34;&#34;, createdFileSHA, &#34;&#34;,&#xA;          | &#x9;&#x9;f.AsKubeAdmin.TektonController, &amp;has.RetryOptions{Retries: 2, Always: true}, plr)).To(Succeed())&#xA;          | &#x9;createdFileSHA = plr.Labels[&#34;pipelinesascode.tekton.dev/sha&#34;]&#xA;      github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x4df713e?, 0xc000ca2338?})&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/node.go:585&#xA;      github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:946&#xA;      github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 110&#xA;        /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:911&#xA;&lt; Exit [It] PipelineRun should eventually finish - /workspace/source/test/e2e/pac_build.go:492 @ 04/29/26 12:27:15.166 (1h4m12.864s)&#xA;&gt; Enter [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 12:27:15.166&#xA;&lt; Exit [AfterAll] PaC component build - /workspace/source/test/e2e/pac_build.go:102 @ 04/29/26 12:27:15.166 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 12:27:15.166&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/test/e2e/pac_build.go:30 @ 04/29/26 12:27:15.841 (675ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
      </testsuite>
  </testsuites>