pod: gl-multi-component-parent-okfn-on-pull-request-5qspd-init-pod | init container: prepare 2025/10/16 22:30:03 Entrypoint initialization pod: gl-multi-component-parent-okfn-on-pull-request-5qspd-init-pod | init container: place-scripts 2025/10/16 22:30:05 Decoded script /tekton/scripts/script-0-97xmx pod: gl-multi-component-parent-okfn-on-pull-request-5qspd-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:on-pr-a7bf7e454b2e40747bb5f6aefa55a80e3650b0a8 Determine if Image Already Exists pod: gl-multi-component-parent-okfn-on-push-57xhn-apply-tags-pod | init container: prepare 2025/10/16 22:37:29 Entrypoint initialization pod: gl-multi-component-parent-okfn-on-push-57xhn-apply-tags-pod | init container: place-scripts 2025/10/16 22:37:31 Decoded script /tekton/scripts/script-0-l52ng 2025/10/16 22:37:31 Decoded script /tekton/scripts/script-1-nnlb6 pod: gl-multi-component-parent-okfn-on-push-57xhn-apply-tags-pod | container step-apply-additional-tags-from-parameter: No additional tags parameter specified pod: gl-multi-component-parent-okfn-on-push-57xhn-apply-tags-pod | container step-apply-additional-tags-from-image-label: No additional tags specified in the image labels pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | init container: prepare 2025/10/16 22:37:14 Entrypoint initialization pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | init container: place-scripts 2025/10/16 22:37:16 Decoded script /tekton/scripts/script-0-bc8xk 2025/10/16 22:37:16 Decoded script /tekton/scripts/script-1-zzzdn 2025/10/16 22:37:16 Decoded script /tekton/scripts/script-2-2lfff 2025/10/16 22:37:16 Decoded script /tekton/scripts/script-3-29zcn pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | container step-get-image-manifests: Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn@sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e. pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | container step-get-vulnerabilities: Running clair-action on amd64 image manifest... 2025-10-16T22:37:37Z INF matchers created component=libvuln/New matchers=[{"docs":"https://pkg.go.dev/github.com/quay/claircore/alpine","name":"alpine-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/aws","name":"aws-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/rhel","name":"rhel"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/java","name":"java-maven"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/photon","name":"photon"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc","name":"rhel-container-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/ruby","name":"ruby-gem"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/ubuntu","name":"ubuntu-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/oracle","name":"oracle"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/suse","name":"suse"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/debian","name":"debian-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/gobin","name":"gobin"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/python","name":"python"}] 2025-10-16T22:37:37Z INF libvuln initialized component=libvuln/New 2025-10-16T22:37:39Z INF registered configured scanners component=libindex/New 2025-10-16T22:37:39Z INF NewLayerScanner: constructing a new layer-scanner component=indexer.NewLayerScanner 2025-10-16T22:37:39Z INF index request start component=libindex/Libindex.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e 2025-10-16T22:37:39Z INF starting scan component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e 2025-10-16T22:37:39Z INF manifest to be scanned component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=CheckManifest 2025-10-16T22:37:39Z INF layers fetch start component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=FetchLayers 2025-10-16T22:37:40Z INF layers fetch success component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=FetchLayers 2025-10-16T22:37:40Z INF layers fetch done component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=FetchLayers 2025-10-16T22:37:40Z INF layers scan start component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=ScanLayers 2025-10-16T22:37:40Z INF layers scan done component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=ScanLayers 2025-10-16T22:37:40Z INF starting index manifest component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=IndexManifest 2025-10-16T22:37:40Z INF finishing scan component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=IndexFinished 2025-10-16T22:37:40Z INF manifest successfully scanned component=indexer/controller/Controller.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e state=IndexFinished 2025-10-16T22:37:40Z INF index request done component=libindex/Libindex.Index manifest=sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e { "manifest_hash": "sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e", "packages": { "+A7/nzEXX3Q/xJZ50VMnlQ==": { "id": "+A7/nzEXX3Q/xJZ50VMnlQ==", "name": "libidn2", "version": "2.3.0-7.el9", "kind": "binary", "source": { "id": "", "name": "libidn2", "version": "2.3.0-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+X1MdmtPTbyDb/wq7joJhA==": { "id": "+X1MdmtPTbyDb/wq7joJhA==", "name": "libtool-ltdl", "version": "2.4.6-46.el9", "kind": "binary", "source": { "id": "", "name": "libtool", "version": "2.4.6-46.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+bwl6UbMaWOBWdHNekJsEw==": { "id": "+bwl6UbMaWOBWdHNekJsEw==", "name": "coreutils-single", "version": "8.32-39.el9", "kind": "binary", "source": { "id": "", "name": "coreutils", "version": "8.32-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/L1kFEoHZTukrNTCQLypFQ==": { "id": "/L1kFEoHZTukrNTCQLypFQ==", "name": "xz-libs", "version": "5.2.5-8.el9_0", "kind": "binary", "source": { "id": "", "name": "xz", "version": "5.2.5-8.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/O7rOBo1qRMFm3q3Kf3mEw==": { "id": "/O7rOBo1qRMFm3q3Kf3mEw==", "name": "libselinux", "version": "3.6-3.el9", "kind": "binary", "source": { "id": "", "name": "libselinux", "version": "3.6-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/h/TBQhfoSMCmey5oN87jA==": { "id": "/h/TBQhfoSMCmey5oN87jA==", "name": "libsolv", "version": "0.7.24-3.el9", "kind": "binary", "source": { "id": "", "name": "libsolv", "version": "0.7.24-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/ub7EE8Da46T0x7lRdlVJg==": { "id": "/ub7EE8Da46T0x7lRdlVJg==", "name": "libsmartcols", "version": "2.37.4-21.el9", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0T19Aon0dgLleTpQjLWzKw==": { "id": "0T19Aon0dgLleTpQjLWzKw==", "name": "crypto-policies", "version": "20250128-1.git5269e22.el9", "kind": "binary", "source": { "id": "", "name": "crypto-policies", "version": "20250128-1.git5269e22.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "1atoBfoH0mJ0bCpetQ7/0g==": { "id": "1atoBfoH0mJ0bCpetQ7/0g==", "name": "file-libs", "version": "5.39-16.el9", "kind": "binary", "source": { "id": "", "name": "file", "version": "5.39-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "2gCbp4kt+cF44NF/LqukDg==": { "id": "2gCbp4kt+cF44NF/LqukDg==", "name": "pcre2-syntax", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "5+tHFkkNi+1rUDSrmgYdkw==": { "id": "5+tHFkkNi+1rUDSrmgYdkw==", "name": "p11-kit-trust", "version": "0.25.3-3.el9_5", "kind": "binary", "source": { "id": "", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "5fhQlRzIg/IB8EVM2pFIZA==": { "id": "5fhQlRzIg/IB8EVM2pFIZA==", "name": "audit-libs", "version": "3.1.5-4.el9", "kind": "binary", "source": { "id": "", "name": "audit", "version": "3.1.5-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6WyRl8U3PR6ipKlxqlBzFA==": { "id": "6WyRl8U3PR6ipKlxqlBzFA==", "name": "ncurses-base", "version": "6.2-10.20210508.el9_6.2", "kind": "binary", "source": { "id": "", "name": "ncurses", "version": "6.2-10.20210508.el9_6.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "7cpIREEQnkaI7dbmWgmrvg==": { "id": "7cpIREEQnkaI7dbmWgmrvg==", "name": "gdbm-libs", "version": "1:1.23-1.el9", "kind": "binary", "source": { "id": "", "name": "gdbm", "version": "1.23-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7mDaaxs3ev+uNEDYC97U3Q==": { "id": "7mDaaxs3ev+uNEDYC97U3Q==", "name": "zlib", "version": "1.2.11-40.el9", "kind": "binary", "source": { "id": "", "name": "zlib", "version": "1.2.11-40.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7ra56f21gLrcSpBD8a9+NQ==": { "id": "7ra56f21gLrcSpBD8a9+NQ==", "name": "libmount", "version": "2.37.4-21.el9", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7vssDPaHKfFKMLimKBo7Gw==": { "id": "7vssDPaHKfFKMLimKBo7Gw==", "name": "libpeas", "version": "1.30.0-4.el9", "kind": "binary", "source": { "id": "", "name": "libpeas", "version": "1.30.0-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8uME+PFu6p/OAD7q+ZTVLw==": { "id": "8uME+PFu6p/OAD7q+ZTVLw==", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "binary", "source": { "id": "", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "9olIUlLHZMdoUMju+8diyQ==": { "id": "9olIUlLHZMdoUMju+8diyQ==", "name": "filesystem", "version": "3.16-5.el9", "kind": "binary", "source": { "id": "", "name": "filesystem", "version": "3.16-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "BQhiFmX4hLYteW4oRCLTSA==": { "id": "BQhiFmX4hLYteW4oRCLTSA==", "name": "libassuan", "version": "2.5.5-3.el9", "kind": "binary", "source": { "id": "", "name": "libassuan", "version": "2.5.5-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "BRLVvSCW1qZQlEQR2x48fQ==": { "id": "BRLVvSCW1qZQlEQR2x48fQ==", "name": "gobject-introspection", "version": "1.68.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gobject-introspection", "version": "1.68.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CpfomSYboaXPZ9yn9NgGgw==": { "id": "CpfomSYboaXPZ9yn9NgGgw==", "name": "krb5-libs", "version": "1.21.1-8.el9_6", "kind": "binary", "source": { "id": "", "name": "krb5", "version": "1.21.1-8.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DrLq8qfU1bfE8o8AfdvkrQ==": { "id": "DrLq8qfU1bfE8o8AfdvkrQ==", "name": "libverto", "version": "0.3.2-3.el9", "kind": "binary", "source": { "id": "", "name": "libverto", "version": "0.3.2-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FZ9gWulzkx76xjTSH/yM/g==": { "id": "FZ9gWulzkx76xjTSH/yM/g==", "name": "openssl-fips-provider", "version": "3.0.7-6.el9_5", "kind": "binary", "source": { "id": "", "name": "openssl-fips-provider", "version": "3.0.7-6.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FrUQI+koTfbikRk1jsFd0w==": { "id": "FrUQI+koTfbikRk1jsFd0w==", "name": "libstdc++", "version": "11.5.0-5.el9_5", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-5.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "G61ZL2SOHR2qgvQfi118gw==": { "id": "G61ZL2SOHR2qgvQfi118gw==", "name": "dejavu-sans-fonts", "version": "2.37-18.el9", "kind": "binary", "source": { "id": "", "name": "dejavu-fonts", "version": "2.37-18.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "HQdWvmyUSqtI3UTY0T4JiQ==": { "id": "HQdWvmyUSqtI3UTY0T4JiQ==", "name": "pcre", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "I16VSEydeiRYB1TSf5694A==": { "id": "I16VSEydeiRYB1TSf5694A==", "name": "libreport-filesystem", "version": "2.15.2-6.el9", "kind": "binary", "source": { "id": "", "name": "libreport", "version": "2.15.2-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "IZ65O3ZOapykHwhaOX1/YA==": { "id": "IZ65O3ZOapykHwhaOX1/YA==", "name": "libnghttp2", "version": "1.43.0-6.el9", "kind": "binary", "source": { "id": "", "name": "nghttp2", "version": "1.43.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JKP7JzVg7UGaAz4VrH03lQ==": { "id": "JKP7JzVg7UGaAz4VrH03lQ==", "name": "langpacks-core-font-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "KF5C+zKu/uFB7knCqOvDAQ==": { "id": "KF5C+zKu/uFB7knCqOvDAQ==", "name": "json-glib", "version": "1.6.6-1.el9", "kind": "binary", "source": { "id": "", "name": "json-glib", "version": "1.6.6-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KXUGN6voGlWUMRN5TCFy4w==": { "id": "KXUGN6voGlWUMRN5TCFy4w==", "name": "systemd-libs", "version": "252-51.el9_6.2", "kind": "binary", "source": { "id": "", "name": "systemd", "version": "252-51.el9_6.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Lwqn0aweLQLZmo12VvYcog==": { "id": "Lwqn0aweLQLZmo12VvYcog==", "name": "popt", "version": "1.18-8.el9", "kind": "binary", "source": { "id": "", "name": "popt", "version": "1.18-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "M9YTWinowLqOqX/+8mbhjg==": { "id": "M9YTWinowLqOqX/+8mbhjg==", "name": "sqlite-libs", "version": "3.34.1-8.el9_6", "kind": "binary", "source": { "id": "", "name": "sqlite", "version": "3.34.1-8.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "MDH8Zt4oQWDiYk9qFV5Lbg==": { "id": "MDH8Zt4oQWDiYk9qFV5Lbg==", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "binary", "source": { "id": "", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "NdCY2/S+syamLH224R4hug==": { "id": "NdCY2/S+syamLH224R4hug==", "name": "langpacks-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "O1acB+rpl9OLkk9I6phF7Q==": { "id": "O1acB+rpl9OLkk9I6phF7Q==", "name": "shadow-utils", "version": "2:4.9-12.el9", "kind": "binary", "source": { "id": "", "name": "shadow-utils", "version": "4.9-12.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OCIjbR16ktOEiFK36r0WNw==": { "id": "OCIjbR16ktOEiFK36r0WNw==", "name": "libtasn1", "version": "4.16.0-9.el9", "kind": "binary", "source": { "id": "", "name": "libtasn1", "version": "4.16.0-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OaFmq38HlbKLTTEM/qATzg==": { "id": "OaFmq38HlbKLTTEM/qATzg==", "name": "libcurl-minimal", "version": "7.76.1-31.el9_6.1", "kind": "binary", "source": { "id": "", "name": "curl", "version": "7.76.1-31.el9_6.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OgwdUybWl/HQYbnPTE4Psw==": { "id": "OgwdUybWl/HQYbnPTE4Psw==", "name": "npth", "version": "1.6-8.el9", "kind": "binary", "source": { "id": "", "name": "npth", "version": "1.6-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Ohssf0Jzlafd9vtrrUKCXg==": { "id": "Ohssf0Jzlafd9vtrrUKCXg==", "name": "bash", "version": "5.1.8-9.el9", "kind": "binary", "source": { "id": "", "name": "bash", "version": "5.1.8-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "P5Om9zCJ/QZ+hnrEvj6fGw==": { "id": "P5Om9zCJ/QZ+hnrEvj6fGw==", "name": "libgcrypt", "version": "1.10.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libgcrypt", "version": "1.10.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PIk2BBAWexCFofMi5q03RA==": { "id": "PIk2BBAWexCFofMi5q03RA==", "name": "pcre2", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PZXvGa4khHd2n6o73hJ/Pg==": { "id": "PZXvGa4khHd2n6o73hJ/Pg==", "name": "microdnf", "version": "3.9.1-3.el9", "kind": "binary", "source": { "id": "", "name": "microdnf", "version": "3.9.1-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RXh3fimX8fGZeCt4chJEiA==": { "id": "RXh3fimX8fGZeCt4chJEiA==", "name": "librhsm", "version": "0.0.3-9.el9", "kind": "binary", "source": { "id": "", "name": "librhsm", "version": "0.0.3-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "S8p9UGak1oycptcpYp/1eg==": { "id": "S8p9UGak1oycptcpYp/1eg==", "name": "openldap", "version": "2.6.8-4.el9", "kind": "binary", "source": { "id": "", "name": "openldap", "version": "2.6.8-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "SjQtW3gQmgt+Qj8JlnY4Mg==": { "id": "SjQtW3gQmgt+Qj8JlnY4Mg==", "name": "libblkid", "version": "2.37.4-21.el9", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Su8bfW9ijc0V5CiAum2V1g==": { "id": "Su8bfW9ijc0V5CiAum2V1g==", "name": "bzip2-libs", "version": "1.0.8-10.el9_5", "kind": "binary", "source": { "id": "", "name": "bzip2", "version": "1.0.8-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "TPIRq84Pr3a6ywzPeCr3Pw==": { "id": "TPIRq84Pr3a6ywzPeCr3Pw==", "name": "libcap-ng", "version": "0.8.2-7.el9", "kind": "binary", "source": { "id": "", "name": "libcap-ng", "version": "0.8.2-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "To0NR+oyXDu1CYJfmVGurQ==": { "id": "To0NR+oyXDu1CYJfmVGurQ==", "name": "gpgme", "version": "1.15.1-6.el9", "kind": "binary", "source": { "id": "", "name": "gpgme", "version": "1.15.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "VV2Z1ngTs6sGvt5SrayPCg==": { "id": "VV2Z1ngTs6sGvt5SrayPCg==", "name": "libgpg-error", "version": "1.42-5.el9", "kind": "binary", "source": { "id": "", "name": "libgpg-error", "version": "1.42-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "VX9V+Y680L2xf2tBREdpCw==": { "id": "VX9V+Y680L2xf2tBREdpCw==", "name": "gmp", "version": "1:6.2.0-13.el9", "kind": "binary", "source": { "id": "", "name": "gmp", "version": "6.2.0-13.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "WtG8AvirpmNJ8wVE+fxfGQ==": { "id": "WtG8AvirpmNJ8wVE+fxfGQ==", "name": "libxml2", "version": "2.9.13-12.el9_6", "kind": "binary", "source": { "id": "", "name": "libxml2", "version": "2.9.13-12.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XG5+bW8np2NedSy/od6z8Q==": { "id": "XG5+bW8np2NedSy/od6z8Q==", "name": "libacl", "version": "2.3.1-4.el9", "kind": "binary", "source": { "id": "", "name": "acl", "version": "2.3.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XJlS+gwEt7T+nNr/Bflqzg==": { "id": "XJlS+gwEt7T+nNr/Bflqzg==", "name": "glibc-minimal-langpack", "version": "2.34-168.el9_6.23", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-168.el9_6.23", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XMkvB1ljVS0bNTUu2UEs3g==": { "id": "XMkvB1ljVS0bNTUu2UEs3g==", "name": "libgcc", "version": "11.5.0-5.el9_5", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-5.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XwbkaIGCYyq6BjBMVZ1wzw==": { "id": "XwbkaIGCYyq6BjBMVZ1wzw==", "name": "readline", "version": "8.1-4.el9", "kind": "binary", "source": { "id": "", "name": "readline", "version": "8.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ZabCZVOpeuHGnRiGdzqBig==": { "id": "ZabCZVOpeuHGnRiGdzqBig==", "name": "openssl-fips-provider-so", "version": "3.0.7-6.el9_5", "kind": "binary", "source": { "id": "", "name": "openssl-fips-provider", "version": "3.0.7-6.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "arLt5War9yeQ8auYn/Idmw==": { "id": "arLt5War9yeQ8auYn/Idmw==", "name": "nettle", "version": "3.10.1-1.el9", "kind": "binary", "source": { "id": "", "name": "nettle", "version": "3.10.1-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ayTA+mXRKgSCRl5LaqP4/w==": { "id": "ayTA+mXRKgSCRl5LaqP4/w==", "name": "glib2", "version": "2.68.4-16.el9_6.2", "kind": "binary", "source": { "id": "", "name": "glib2", "version": "2.68.4-16.el9_6.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bFvWffGqJWr7FWnI7K9NVw==": { "id": "bFvWffGqJWr7FWnI7K9NVw==", "name": "grep", "version": "3.6-5.el9", "kind": "binary", "source": { "id": "", "name": "grep", "version": "3.6-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bemGVBhbDe9iV1Kjvd9hAA==": { "id": "bemGVBhbDe9iV1Kjvd9hAA==", "name": "libffi", "version": "3.4.2-8.el9", "kind": "binary", "source": { "id": "", "name": "libffi", "version": "3.4.2-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bgzKs6bbeWeXxcqE+n7Jog==": { "id": "bgzKs6bbeWeXxcqE+n7Jog==", "name": "libsepol", "version": "3.6-2.el9", "kind": "binary", "source": { "id": "", "name": "libsepol", "version": "3.6-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dC9CoYt17eaqinGSVCfCxw==": { "id": "dC9CoYt17eaqinGSVCfCxw==", "name": "libattr", "version": "2.5.1-3.el9", "kind": "binary", "source": { "id": "", "name": "attr", "version": "2.5.1-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "de44cUqF23LvU0fOSvNRjA==": { "id": "de44cUqF23LvU0fOSvNRjA==", "name": "libevent", "version": "2.1.12-8.el9_4", "kind": "binary", "source": { "id": "", "name": "libevent", "version": "2.1.12-8.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dpQG/pUwAqVv1OdQqnvylQ==": { "id": "dpQG/pUwAqVv1OdQqnvylQ==", "name": "libsigsegv", "version": "2.13-4.el9", "kind": "binary", "source": { "id": "", "name": "libsigsegv", "version": "2.13-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "eK3V3oi6vbIfOQRAcWBYDw==": { "id": "eK3V3oi6vbIfOQRAcWBYDw==", "name": "glibc-common", "version": "2.34-168.el9_6.23", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-168.el9_6.23", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "eRa7MZyiHBvsv7GPhkGKdg==": { "id": "eRa7MZyiHBvsv7GPhkGKdg==", "name": "lua-libs", "version": "5.4.4-4.el9", "kind": "binary", "source": { "id": "", "name": "lua", "version": "5.4.4-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "eaygsCP+5IpdIryvw94Tcw==": { "id": "eaygsCP+5IpdIryvw94Tcw==", "name": "rootfiles", "version": "8.1-34.el9", "kind": "binary", "source": { "id": "", "name": "rootfiles", "version": "8.1-34.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "f8lJd/yoDqE6O0RUQGqkpQ==": { "id": "f8lJd/yoDqE6O0RUQGqkpQ==", "name": "libusbx", "version": "1.0.26-1.el9", "kind": "binary", "source": { "id": "", "name": "libusbx", "version": "1.0.26-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "gsKPriszRNKAqMnHK+dXgw==": { "id": "gsKPriszRNKAqMnHK+dXgw==", "name": "libksba", "version": "1.5.1-7.el9", "kind": "binary", "source": { "id": "", "name": "libksba", "version": "1.5.1-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hYEisV19Dxn4PvCvxJFm5A==": { "id": "hYEisV19Dxn4PvCvxJFm5A==", "name": "lz4-libs", "version": "1.9.3-5.el9", "kind": "binary", "source": { "id": "", "name": "lz4", "version": "1.9.3-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iTD/lpKAM3AZEWh+zVx2tg==": { "id": "iTD/lpKAM3AZEWh+zVx2tg==", "name": "librepo", "version": "1.14.5-2.el9", "kind": "binary", "source": { "id": "", "name": "librepo", "version": "1.14.5-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iVtx1BX52G3zRfk+g/oWIg==": { "id": "iVtx1BX52G3zRfk+g/oWIg==", "name": "openssl-libs", "version": "1:3.2.2-6.el9_5.1", "kind": "binary", "source": { "id": "", "name": "openssl", "version": "3.2.2-6.el9_5.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iaJm7Mdk9UadnBII0ZwMeA==": { "id": "iaJm7Mdk9UadnBII0ZwMeA==", "name": "dnf-data", "version": "4.14.0-25.el9", "kind": "binary", "source": { "id": "", "name": "dnf", "version": "4.14.0-25.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "izPQpATHYfezyT+kcua/tQ==": { "id": "izPQpATHYfezyT+kcua/tQ==", "name": "gnutls", "version": "3.8.3-6.el9_6.2", "kind": "binary", "source": { "id": "", "name": "gnutls", "version": "3.8.3-6.el9_6.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "jAjaNW7NMGiv7HfByDu4RQ==": { "id": "jAjaNW7NMGiv7HfByDu4RQ==", "name": "alternatives", "version": "1.24-2.el9", "kind": "binary", "source": { "id": "", "name": "chkconfig", "version": "1.24-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kAEPeyZOK/FwFoG6mOFUbQ==": { "id": "kAEPeyZOK/FwFoG6mOFUbQ==", "name": "libcap", "version": "2.48-9.el9_2", "kind": "binary", "source": { "id": "", "name": "libcap", "version": "2.48-9.el9_2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kFxhSjWy84mTZBM4XiZaeQ==": { "id": "kFxhSjWy84mTZBM4XiZaeQ==", "name": "setup", "version": "2.13.7-10.el9", "kind": "binary", "source": { "id": "", "name": "setup", "version": "2.13.7-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "kgbITSeRtKiT7enG8buGXw==": { "id": "kgbITSeRtKiT7enG8buGXw==", "name": "libcom_err", "version": "1.46.5-7.el9", "kind": "binary", "source": { "id": "", "name": "e2fsprogs", "version": "1.46.5-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kigiD4fuysu8/DeCr+ONKQ==": { "id": "kigiD4fuysu8/DeCr+ONKQ==", "name": "basesystem", "version": "11-13.el9", "kind": "binary", "source": { "id": "", "name": "basesystem", "version": "11-13.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "kp6BaioAZ30jbVeZkkzokA==": { "id": "kp6BaioAZ30jbVeZkkzokA==", "name": "libzstd", "version": "1.5.5-1.el9", "kind": "binary", "source": { "id": "", "name": "zstd", "version": "1.5.5-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kvpHJLhsWpgEBJjx168pDg==": { "id": "kvpHJLhsWpgEBJjx168pDg==", "name": "tzdata", "version": "2025b-1.el9", "kind": "binary", "source": { "id": "", "name": "tzdata", "version": "2025b-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "lI6hCbIwETVhCFhL4BxyiQ==": { "id": "lI6hCbIwETVhCFhL4BxyiQ==", "name": "libdnf", "version": "0.69.0-13.el9", "kind": "binary", "source": { "id": "", "name": "libdnf", "version": "0.69.0-13.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "lad8JH31WlI0MsNEYhUWlA==": { "id": "lad8JH31WlI0MsNEYhUWlA==", "name": "glibc", "version": "2.34-168.el9_6.23", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-168.el9_6.23", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "mDM1q1sl0PqUWEn54kTSRw==": { "id": "mDM1q1sl0PqUWEn54kTSRw==", "name": "curl-minimal", "version": "7.76.1-31.el9_6.1", "kind": "binary", "source": { "id": "", "name": "curl", "version": "7.76.1-31.el9_6.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "mK/FUfODp3MR7WS2xegPsw==": { "id": "mK/FUfODp3MR7WS2xegPsw==", "name": "langpacks-core-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "mPqGnMbiXN6jP61aGbHvOA==": { "id": "mPqGnMbiXN6jP61aGbHvOA==", "name": "libyaml", "version": "0.2.5-7.el9", "kind": "binary", "source": { "id": "", "name": "libyaml", "version": "0.2.5-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "nzQEyt4JfkGeZIIHPiBhog==": { "id": "nzQEyt4JfkGeZIIHPiBhog==", "name": "libuuid", "version": "2.37.4-21.el9", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "nzlusFbkan5h1d1Ks+BKBQ==": { "id": "nzlusFbkan5h1d1Ks+BKBQ==", "name": "ncurses-libs", "version": "6.2-10.20210508.el9_6.2", "kind": "binary", "source": { "id": "", "name": "ncurses", "version": "6.2-10.20210508.el9_6.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "pYM7mYzFYUjRrK74RyhfOw==": { "id": "pYM7mYzFYUjRrK74RyhfOw==", "name": "redhat-release", "version": "9.6-0.1.el9", "kind": "binary", "source": { "id": "", "name": "redhat-release", "version": "9.6-0.1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qYSZ6aKFWol313IOGRXaug==": { "id": "qYSZ6aKFWol313IOGRXaug==", "name": "json-c", "version": "0.14-11.el9", "kind": "binary", "source": { "id": "", "name": "json-c", "version": "0.14-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rCLp3m64Catai9VuHvh3Lw==": { "id": "rCLp3m64Catai9VuHvh3Lw==", "name": "keyutils-libs", "version": "1.6.3-1.el9", "kind": "binary", "source": { "id": "", "name": "keyutils", "version": "1.6.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rY/kE/V4JnxYoqV+lmc9mg==": { "id": "rY/kE/V4JnxYoqV+lmc9mg==", "name": "gawk", "version": "5.1.0-6.el9", "kind": "binary", "source": { "id": "", "name": "gawk", "version": "5.1.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rlHYqOr0lkUB/Gs6b1kD2g==": { "id": "rlHYqOr0lkUB/Gs6b1kD2g==", "name": "mpfr", "version": "4.1.0-7.el9", "kind": "binary", "source": { "id": "", "name": "mpfr", "version": "4.1.0-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ssPaV1VLDu6d5ZJ6Rrmh3A==": { "id": "ssPaV1VLDu6d5ZJ6Rrmh3A==", "name": "sed", "version": "4.8-9.el9", "kind": "binary", "source": { "id": "", "name": "sed", "version": "4.8-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "sx0C6L5COHIkv6yQQyPlbw==": { "id": "sx0C6L5COHIkv6yQQyPlbw==", "name": "libunistring", "version": "0.9.10-15.el9", "kind": "binary", "source": { "id": "", "name": "libunistring", "version": "0.9.10-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "u5TyEoU5GA6Z2czzwhMLiA==": { "id": "u5TyEoU5GA6Z2czzwhMLiA==", "name": "fonts-filesystem", "version": "1:2.0.5-7.el9.1", "kind": "binary", "source": { "id": "", "name": "fonts-rpm-macros", "version": "2.0.5-7.el9.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "v3i4ez5juML2ZWwR+6dFFg==": { "id": "v3i4ez5juML2ZWwR+6dFFg==", "name": "gnupg2", "version": "2.3.3-4.el9", "kind": "binary", "source": { "id": "", "name": "gnupg2", "version": "2.3.3-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "wCA3gMNtInqX1xg18QcnQg==": { "id": "wCA3gMNtInqX1xg18QcnQg==", "name": "ca-certificates", "version": "2024.2.69_v8.0.303-91.4.el9_4", "kind": "binary", "source": { "id": "", "name": "ca-certificates", "version": "2024.2.69_v8.0.303-91.4.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "wfJGCqOH8d+IYg/dAepx1A==": { "id": "wfJGCqOH8d+IYg/dAepx1A==", "name": "libarchive", "version": "3.5.3-6.el9_6", "kind": "binary", "source": { "id": "", "name": "libarchive", "version": "3.5.3-6.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "x4oijVhQU8BUwJwoFvk4QA==": { "id": "x4oijVhQU8BUwJwoFvk4QA==", "name": "libmodulemd", "version": "2.13.0-2.el9", "kind": "binary", "source": { "id": "", "name": "libmodulemd", "version": "2.13.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xSopjH0yPtbnx33MBmtmuA==": { "id": "xSopjH0yPtbnx33MBmtmuA==", "name": "rpm-libs", "version": "4.16.1.3-37.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-37.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xhMgwxa+ubXlCA6s9XfRgw==": { "id": "xhMgwxa+ubXlCA6s9XfRgw==", "name": "cyrus-sasl-lib", "version": "2.1.27-21.el9", "kind": "binary", "source": { "id": "", "name": "cyrus-sasl", "version": "2.1.27-21.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yEp9fQVFIQAEDPCwC3GLmA==": { "id": "yEp9fQVFIQAEDPCwC3GLmA==", "name": "libsemanage", "version": "3.6-5.el9_6", "kind": "binary", "source": { "id": "", "name": "libsemanage", "version": "3.6-5.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zPvTALB8qlNtHa1j2iT5Zg==": { "id": "zPvTALB8qlNtHa1j2iT5Zg==", "name": "rpm", "version": "4.16.1.3-37.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-37.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" } }, "distributions": { "28001f0d-acb6-4f13-bf8a-0aad28f5b92e": { "id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "did": "rhel", "name": "Red Hat Enterprise Linux Server", "version": "9", "version_code_name": "", "version_id": "9", "arch": "", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "pretty_name": "Red Hat Enterprise Linux Server 9" } }, "repository": { "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c": { "id": "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "name": "cpe:/a:redhat:enterprise_linux:9::appstream", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*" }, "d271d8d7-9ffa-45da-912c-576f9247d036": { "id": "d271d8d7-9ffa-45da-912c-576f9247d036", "name": "cpe:/o:redhat:enterprise_linux:9::baseos", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*" } }, "environments": { "+A7/nzEXX3Q/xJZ50VMnlQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "+X1MdmtPTbyDb/wq7joJhA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "+bwl6UbMaWOBWdHNekJsEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "/L1kFEoHZTukrNTCQLypFQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "/O7rOBo1qRMFm3q3Kf3mEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "/h/TBQhfoSMCmey5oN87jA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "/ub7EE8Da46T0x7lRdlVJg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "0T19Aon0dgLleTpQjLWzKw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "1atoBfoH0mJ0bCpetQ7/0g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "2gCbp4kt+cF44NF/LqukDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "5+tHFkkNi+1rUDSrmgYdkw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "5fhQlRzIg/IB8EVM2pFIZA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "6WyRl8U3PR6ipKlxqlBzFA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "7cpIREEQnkaI7dbmWgmrvg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "7mDaaxs3ev+uNEDYC97U3Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "7ra56f21gLrcSpBD8a9+NQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "7vssDPaHKfFKMLimKBo7Gw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "8uME+PFu6p/OAD7q+ZTVLw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "9olIUlLHZMdoUMju+8diyQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "BQhiFmX4hLYteW4oRCLTSA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "BRLVvSCW1qZQlEQR2x48fQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "CpfomSYboaXPZ9yn9NgGgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "DrLq8qfU1bfE8o8AfdvkrQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "FZ9gWulzkx76xjTSH/yM/g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "FrUQI+koTfbikRk1jsFd0w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "G61ZL2SOHR2qgvQfi118gw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "HQdWvmyUSqtI3UTY0T4JiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "I16VSEydeiRYB1TSf5694A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "IZ65O3ZOapykHwhaOX1/YA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "JKP7JzVg7UGaAz4VrH03lQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "KF5C+zKu/uFB7knCqOvDAQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "KXUGN6voGlWUMRN5TCFy4w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "Lwqn0aweLQLZmo12VvYcog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "M9YTWinowLqOqX/+8mbhjg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "MDH8Zt4oQWDiYk9qFV5Lbg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "NdCY2/S+syamLH224R4hug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "O1acB+rpl9OLkk9I6phF7Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "OCIjbR16ktOEiFK36r0WNw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "OaFmq38HlbKLTTEM/qATzg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "OgwdUybWl/HQYbnPTE4Psw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "Ohssf0Jzlafd9vtrrUKCXg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "P5Om9zCJ/QZ+hnrEvj6fGw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "PIk2BBAWexCFofMi5q03RA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "PZXvGa4khHd2n6o73hJ/Pg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "RXh3fimX8fGZeCt4chJEiA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "S8p9UGak1oycptcpYp/1eg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "SjQtW3gQmgt+Qj8JlnY4Mg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "Su8bfW9ijc0V5CiAum2V1g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "TPIRq84Pr3a6ywzPeCr3Pw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "To0NR+oyXDu1CYJfmVGurQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "VV2Z1ngTs6sGvt5SrayPCg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "VX9V+Y680L2xf2tBREdpCw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "WtG8AvirpmNJ8wVE+fxfGQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "XG5+bW8np2NedSy/od6z8Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "XJlS+gwEt7T+nNr/Bflqzg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "XMkvB1ljVS0bNTUu2UEs3g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "XwbkaIGCYyq6BjBMVZ1wzw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "ZabCZVOpeuHGnRiGdzqBig==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "arLt5War9yeQ8auYn/Idmw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "ayTA+mXRKgSCRl5LaqP4/w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "bFvWffGqJWr7FWnI7K9NVw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "bemGVBhbDe9iV1Kjvd9hAA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "bgzKs6bbeWeXxcqE+n7Jog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "dC9CoYt17eaqinGSVCfCxw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "de44cUqF23LvU0fOSvNRjA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "dpQG/pUwAqVv1OdQqnvylQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "eK3V3oi6vbIfOQRAcWBYDw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "eRa7MZyiHBvsv7GPhkGKdg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "eaygsCP+5IpdIryvw94Tcw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "f8lJd/yoDqE6O0RUQGqkpQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "gsKPriszRNKAqMnHK+dXgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "hYEisV19Dxn4PvCvxJFm5A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "iTD/lpKAM3AZEWh+zVx2tg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "iVtx1BX52G3zRfk+g/oWIg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "iaJm7Mdk9UadnBII0ZwMeA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "izPQpATHYfezyT+kcua/tQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "jAjaNW7NMGiv7HfByDu4RQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kAEPeyZOK/FwFoG6mOFUbQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kFxhSjWy84mTZBM4XiZaeQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kgbITSeRtKiT7enG8buGXw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kigiD4fuysu8/DeCr+ONKQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kp6BaioAZ30jbVeZkkzokA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "kvpHJLhsWpgEBJjx168pDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "lI6hCbIwETVhCFhL4BxyiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "lad8JH31WlI0MsNEYhUWlA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "mDM1q1sl0PqUWEn54kTSRw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "mK/FUfODp3MR7WS2xegPsw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "mPqGnMbiXN6jP61aGbHvOA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "nzQEyt4JfkGeZIIHPiBhog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "nzlusFbkan5h1d1Ks+BKBQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "pYM7mYzFYUjRrK74RyhfOw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "qYSZ6aKFWol313IOGRXaug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "rCLp3m64Catai9VuHvh3Lw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "rY/kE/V4JnxYoqV+lmc9mg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "rlHYqOr0lkUB/Gs6b1kD2g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "ssPaV1VLDu6d5ZJ6Rrmh3A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "sx0C6L5COHIkv6yQQyPlbw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "u5TyEoU5GA6Z2czzwhMLiA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "v3i4ez5juML2ZWwR+6dFFg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "wCA3gMNtInqX1xg18QcnQg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "wfJGCqOH8d+IYg/dAepx1A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "x4oijVhQU8BUwJwoFvk4QA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "xSopjH0yPtbnx33MBmtmuA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "xhMgwxa+ubXlCA6s9XfRgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "yEp9fQVFIQAEDPCwC3GLmA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ], "zPvTALB8qlNtHa1j2iT5Zg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "28001f0d-acb6-4f13-bf8a-0aad28f5b92e", "repository_ids": [ "89ba3ea8-f7c4-4235-b855-cc868e2c2b0c", "d271d8d7-9ffa-45da-912c-576f9247d036" ] }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:2920d84eafa0cf94806ab58f0a2124f7b2d35bcbb06fc89a9106dcc28efe397a", "distribution_id": "", "repository_ids": null } ] }, "vulnerabilities": { "/rVEaWl0l9u8biVEKbZTFg==": { "id": "/rVEaWl0l9u8biVEKbZTFg==", "updater": "rhel-vex", "name": "CVE-2023-50495", "description": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", "issued": "2023-12-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "ncurses", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2SApI7oHpcm9Z48+2Hj11w==": { "id": "2SApI7oHpcm9Z48+2Hj11w==", "updater": "rhel-vex", "name": "CVE-2025-5915", "description": "A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2TDjlt2gAEWsLyBBPigFYw==": { "id": "2TDjlt2gAEWsLyBBPigFYw==", "updater": "rhel-vex", "name": "CVE-2024-13176", "description": "A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.", "issued": "2025-01-20T13:29:57Z", "links": "https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6hAQW3vY9ZA/8datv1rY4g==": { "id": "6hAQW3vY9ZA/8datv1rY4g==", "updater": "rhel-vex", "name": "CVE-2024-41996", "description": "A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server's public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.", "issued": "2024-08-26T06:15:04Z", "links": "https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "7cHovEEcBoQ92zXTfFigow==": { "id": "7cHovEEcBoQ92zXTfFigow==", "updater": "rhel-vex", "name": "CVE-2025-9232", "description": "Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.", "issued": "2025-09-30T23:59:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "8kndQj/aRn+NNJdGVP9v4g==": { "id": "8kndQj/aRn+NNJdGVP9v4g==", "updater": "rhel-vex", "name": "CVE-2023-45322", "description": "A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.", "issued": "2023-08-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AUiFITCnRjRxctzqqbDeeA==": { "id": "AUiFITCnRjRxctzqqbDeeA==", "updater": "rhel-vex", "name": "CVE-2022-3219", "description": "A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.", "issued": "2022-09-15T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gnupg2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AsiuN/8gu7sZ0PJCLihjmw==": { "id": "AsiuN/8gu7sZ0PJCLihjmw==", "updater": "rhel-vex", "name": "CVE-2025-4598", "description": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.", "issued": "2025-05-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "systemd", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AwYRRq6SmgfJLn2NZxQUdw==": { "id": "AwYRRq6SmgfJLn2NZxQUdw==", "updater": "rhel-vex", "name": "CVE-2024-34459", "description": "A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.", "issued": "2024-05-08T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DDxCHnX+kCqcRQj9b90/cg==": { "id": "DDxCHnX+kCqcRQj9b90/cg==", "updater": "rhel-vex", "name": "CVE-2023-4156", "description": "A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.", "issued": "2023-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gawk", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "FE/mnRiATGHgivPxG+13dw==": { "id": "FE/mnRiATGHgivPxG+13dw==", "updater": "rhel-vex", "name": "CVE-2025-6170", "description": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.", "issued": "2025-06-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GAn7gWUe2pFr7PbwechqxA==": { "id": "GAn7gWUe2pFr7PbwechqxA==", "updater": "rhel-vex", "name": "CVE-2025-30258", "description": "A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.", "issued": "2025-03-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gnupg2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "HxI42iSjURjRki+uV6q/9w==": { "id": "HxI42iSjURjRki+uV6q/9w==", "updater": "rhel-vex", "name": "CVE-2024-0232", "description": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.", "issued": "2023-10-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "sqlite", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Kqq2xlybjD/tOLmQWu2xPw==": { "id": "Kqq2xlybjD/tOLmQWu2xPw==", "updater": "rhel-vex", "name": "CVE-2025-5918", "description": "A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Pza9Y2xtH9MChVMkZwgw2A==": { "id": "Pza9Y2xtH9MChVMkZwgw2A==", "updater": "rhel-vex", "name": "CVE-2024-7264", "description": "A flaw was found in libcurl, where libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.", "issued": "2024-07-31T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Rs2w9Uui+dW2Lg48Ml6jpw==": { "id": "Rs2w9Uui+dW2Lg48Ml6jpw==", "updater": "rhel-vex", "name": "CVE-2025-1632", "description": "A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior.", "issued": "2025-02-24T13:31:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "S5Dzz9cigoJDCj8s5UcT0g==": { "id": "S5Dzz9cigoJDCj8s5UcT0g==", "updater": "rhel-vex", "name": "CVE-2022-41409", "description": "A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.", "issued": "2023-07-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "pcre2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "SH6jsaECmWs0mj3SMlChWA==": { "id": "SH6jsaECmWs0mj3SMlChWA==", "updater": "rhel-vex", "name": "CVE-2025-5278", "description": "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.", "issued": "2025-05-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "coreutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "VWEbeFnFOHy1IkG21b5a5g==": { "id": "VWEbeFnFOHy1IkG21b5a5g==", "updater": "rhel-vex", "name": "CVE-2023-30571", "description": "A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.", "issued": "2023-05-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XPUXyp+BOEJyEGOgXafi8Q==": { "id": "XPUXyp+BOEJyEGOgXafi8Q==", "updater": "rhel-vex", "name": "CVE-2022-27943", "description": "A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.", "issued": "2022-03-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gcc", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "a9FllBAJiFi5FeYl0KG4aQ==": { "id": "a9FllBAJiFi5FeYl0KG4aQ==", "updater": "rhel-vex", "name": "CVE-2024-11053", "description": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.", "issued": "2024-12-11T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "aDJK/oIxfKTdGBwKif3CBA==": { "id": "aDJK/oIxfKTdGBwKif3CBA==", "updater": "rhel-vex", "name": "CVE-2025-9086", "description": "1. A cookie is set using the `secure` keyword for `https://target`\n2. curl is redirected to or otherwise made to speak with `http://target` (same\n hostname, but using clear text HTTP) using the same cookie set\n3. The same cookie name is set - but with just a slash as path (`path='/'`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.", "issued": "2025-09-12T05:10:03Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "bds97sTaOsEcrBAsb8OGew==": { "id": "bds97sTaOsEcrBAsb8OGew==", "updater": "rhel-vex", "name": "CVE-2025-9231", "description": "Issue summary: A timing side-channel which could potentially allow remote\nrecovery of the private key exists in the SM2 algorithm implementation on 64 bit\nARM platforms.\n\nImpact summary: A timing side-channel in SM2 signature computations on 64 bit\nARM platforms could allow recovering the private key by an attacker..\n\nWhile remote key recovery over a network was not attempted by the reporter,\ntiming measurements revealed a timing signal which may allow such an attack.\n\nOpenSSL does not directly support certificates with SM2 keys in TLS, and so\nthis CVE is not relevant in most TLS contexts. However, given that it is\npossible to add support for such certificates via a custom provider, coupled\nwith the fact that in such a custom provider context the private key may be\nrecoverable via remote timing measurements, we consider this to be a Moderate\nseverity issue.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as SM2 is not an approved algorithm.", "issued": "2025-09-30T23:59:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9231 https://bugzilla.redhat.com/show_bug.cgi?id=2396055 https://www.cve.org/CVERecord?id=CVE-2025-9231 https://nvd.nist.gov/vuln/detail/CVE-2025-9231 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9231.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "e0VfCD1REapdkagkByCnXQ==": { "id": "e0VfCD1REapdkagkByCnXQ==", "updater": "rhel-vex", "name": "CVE-2025-3360", "description": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.", "issued": "2025-04-07T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "glib2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "e8SrNOXyA1JlmfVvyW6ZBw==": { "id": "e8SrNOXyA1JlmfVvyW6ZBw==", "updater": "rhel-vex", "name": "CVE-2025-9230", "description": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.", "issued": "2025-09-30T23:59:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9230 https://bugzilla.redhat.com/show_bug.cgi?id=2396054 https://www.cve.org/CVERecord?id=CVE-2025-9230 https://nvd.nist.gov/vuln/detail/CVE-2025-9230 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9230.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fwfAtjf5gVRneidAp93edQ==": { "id": "fwfAtjf5gVRneidAp93edQ==", "updater": "rhel-vex", "name": "CVE-2025-5917", "description": "A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "h08ca9AawAYymWtiO1A44A==": { "id": "h08ca9AawAYymWtiO1A44A==", "updater": "rhel-vex", "name": "CVE-2025-5916", "description": "A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "ixc06f0H9vqMfsbwQSwwvA==": { "id": "ixc06f0H9vqMfsbwQSwwvA==", "updater": "rhel-vex", "name": "CVE-2023-32636", "description": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "issued": "2022-12-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "glib2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "jiVVTQmOtKqVixv7agF/Hg==": { "id": "jiVVTQmOtKqVixv7agF/Hg==", "updater": "rhel-vex", "name": "CVE-2025-27113", "description": "A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.", "issued": "2025-02-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oqSc7q4k6wTno/u9knscCQ==": { "id": "oqSc7q4k6wTno/u9knscCQ==", "updater": "rhel-vex", "name": "CVE-2024-9681", "description": "A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than intended.", "issued": "2024-11-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "sVG4udZOusLp3MMAPcEW+g==": { "id": "sVG4udZOusLp3MMAPcEW+g==", "updater": "rhel-vex", "name": "CVE-2024-56433", "description": "A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.", "issued": "2024-12-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "shadow-utils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "xKFSWwGN4NIDnytC6SdEvg==": { "id": "xKFSWwGN4NIDnytC6SdEvg==", "updater": "rhel-vex", "name": "CVE-2025-9714", "description": "A flaw was found in libxstl/libxml2. The 'exsltDynMapFunction' function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling 'dyn:map()', leading to stack exhaustion and a local denial of service.", "issued": "2025-09-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" } }, "package_vulnerabilities": { "+bwl6UbMaWOBWdHNekJsEw==": [ "SH6jsaECmWs0mj3SMlChWA==" ], "2gCbp4kt+cF44NF/LqukDg==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "6WyRl8U3PR6ipKlxqlBzFA==": [ "/rVEaWl0l9u8biVEKbZTFg==" ], "FrUQI+koTfbikRk1jsFd0w==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "KXUGN6voGlWUMRN5TCFy4w==": [ "AsiuN/8gu7sZ0PJCLihjmw==" ], "M9YTWinowLqOqX/+8mbhjg==": [ "HxI42iSjURjRki+uV6q/9w==" ], "O1acB+rpl9OLkk9I6phF7Q==": [ "sVG4udZOusLp3MMAPcEW+g==" ], "OaFmq38HlbKLTTEM/qATzg==": [ "Pza9Y2xtH9MChVMkZwgw2A==", "oqSc7q4k6wTno/u9knscCQ==", "a9FllBAJiFi5FeYl0KG4aQ==", "aDJK/oIxfKTdGBwKif3CBA==" ], "PIk2BBAWexCFofMi5q03RA==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "WtG8AvirpmNJ8wVE+fxfGQ==": [ "AwYRRq6SmgfJLn2NZxQUdw==", "FE/mnRiATGHgivPxG+13dw==", "xKFSWwGN4NIDnytC6SdEvg==", "jiVVTQmOtKqVixv7agF/Hg==", "8kndQj/aRn+NNJdGVP9v4g==" ], "XMkvB1ljVS0bNTUu2UEs3g==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "ayTA+mXRKgSCRl5LaqP4/w==": [ "e0VfCD1REapdkagkByCnXQ==", "ixc06f0H9vqMfsbwQSwwvA==" ], "iVtx1BX52G3zRfk+g/oWIg==": [ "bds97sTaOsEcrBAsb8OGew==", "e8SrNOXyA1JlmfVvyW6ZBw==", "2TDjlt2gAEWsLyBBPigFYw==", "7cHovEEcBoQ92zXTfFigow==", "6hAQW3vY9ZA/8datv1rY4g==" ], "mDM1q1sl0PqUWEn54kTSRw==": [ "Pza9Y2xtH9MChVMkZwgw2A==", "oqSc7q4k6wTno/u9knscCQ==", "a9FllBAJiFi5FeYl0KG4aQ==", "aDJK/oIxfKTdGBwKif3CBA==" ], "nzlusFbkan5h1d1Ks+BKBQ==": [ "/rVEaWl0l9u8biVEKbZTFg==" ], "rY/kE/V4JnxYoqV+lmc9mg==": [ "DDxCHnX+kCqcRQj9b90/cg==" ], "v3i4ez5juML2ZWwR+6dFFg==": [ "GAn7gWUe2pFr7PbwechqxA==", "AUiFITCnRjRxctzqqbDeeA==" ], "wfJGCqOH8d+IYg/dAepx1A==": [ "VWEbeFnFOHy1IkG21b5a5g==", "fwfAtjf5gVRneidAp93edQ==", "h08ca9AawAYymWtiO1A44A==", "Rs2w9Uui+dW2Lg48Ml6jpw==", "Kqq2xlybjD/tOLmQWu2xPw==", "2SApI7oHpcm9Z48+2Hj11w==" ] }, "enrichments": {} } pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | container step-oci-attach-report: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn@sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn@sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e clair-report-amd64.json:application/vnd.redhat.clair-report+json pod: gl-multi-component-parent-okfn-on-push-57xhn-clair-scan-pod | container step-conftest-vulnerabilities: [ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 8, "warnings": [ { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: libarchive-3.5.3-6.el9_6 (CVE-2023-30571), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-9230, CVE-2025-9231), coreutils-single-8.32-39.el9 (CVE-2025-5278), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-9086)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 8 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232), libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170), shadow-utils-2:4.9-12.el9 (CVE-2024-56433), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), gawk-5.1.0-6.el9 (CVE-2023-4156), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), pcre2-10.40-6.el9 (CVE-2022-41409), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 31 } } ] } ] {"vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":8,"low":31,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d", "digests": ["sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e"]}} {"result":"SUCCESS","timestamp":"2025-10-16T22:37:51+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0} pod: gl-multi-component-parent-okfn-on-push-57xhn-clamav-scan-pod | init container: prepare 2025/10/16 22:37:17 Entrypoint initialization pod: gl-multi-component-parent-okfn-on-push-57xhn-clamav-scan-pod | init container: place-scripts 2025/10/16 22:37:27 Decoded script /tekton/scripts/script-0-6n74j 2025/10/16 22:37:27 Decoded script /tekton/scripts/script-1-njbz6 pod: gl-multi-component-parent-okfn-on-push-57xhn-clamav-scan-pod | container step-extract-and-scan-image: Starting clamd ... clamd is ready! Extracting image(s). Running "oc image extract" on image of arch amd64 Scanning image for arch amd64. This operation may take a while. ----------- SCAN SUMMARY ----------- Infected files: 0 Time: 2.201 sec (0 m 2 s) Start Date: 2025:10:16 22:37:50 End Date: 2025:10:16 22:37:53 Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27794/Thu Oct 16 09:30:03 2025 Database version: 27794 [ { "filename": "/work/logs/clamscan-result-log-amd64.json", "namespace": "required_checks", "successes": 2 } ] {"timestamp":"1760654273","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1760654273","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1760654273","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d", "digests": ["sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e"]}} pod: gl-multi-component-parent-okfn-on-push-57xhn-clamav-scan-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn Attaching to quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d Executing (attempt 1): $ oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d@sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json Uploading f35aceeaf6dd clamscan-ec-test-amd64.json Uploading adeba53ec8f6 clamscan-result-amd64.log Uploaded adeba53ec8f6 clamscan-result-amd64.log Uploaded f35aceeaf6dd clamscan-ec-test-amd64.json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d@sha256:98eb735b74233ed9e64bb2af0bb3f33eca087f0d25f421019899f2f9b787cd8e Digest: sha256:bdb42e30c2785b3ced9ac1892e6c7673cbacf974e63c2c2c336fcbb733caaae8 pod: gl-multi-component-parent-okfn-on-push-57xhn-init-pod | init container: prepare 2025/10/16 22:34:54 Entrypoint initialization pod: gl-multi-component-parent-okfn-on-push-57xhn-init-pod | init container: place-scripts 2025/10/16 22:34:55 Decoded script /tekton/scripts/script-0-74ztm pod: gl-multi-component-parent-okfn-on-push-57xhn-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-hjmh/gl-multi-component-parent-okfn:02330ad740034d5785fd6c8963a24f0224dbb30d Determine if Image Already Exists